XXS manual testing
https://portswigger.net/web-security/cross-site-scripting/cheat-sheet https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html)
#Special characters that indicate the possibility of XXS
< > ' " { } ;
hello“;<>
Try:
#Content injection : redirecting user to malicious content
Embed an iframe within html code:
#netcat listener on port 80
#Submit the XXS payload through some login form / blog / query tab
#Shell
#Steal PHP session ID
#Polyglot XXS payload
#Cookie stealer
Last updated