- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 60字
- 2021-07-16 17:53:16
Payload
The XSS snippet we used to successfully execute JavaScript will go here. In the case of SQLi, a successful password attack, or any number of other payload-based attacks, that data would be required as well. If you trip on multiple payload types in one discovery, you should mention however many illustrate the general sanitation rules being misapplied:
<a onmouseover="alert(document.cookie)">xxs link</a>
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 黑客大曝光:無(wú)線網(wǎng)絡(luò)安全(原書(shū)第3版)
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- 工業(yè)互聯(lián)網(wǎng)安全
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 黑客攻防入門(mén)秘笈
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- .NET安全攻防指南(上冊(cè))
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- Learning Devise for Rails
- 信息安全導(dǎo)論(第2版)
- Mastering Reverse Engineering
- 先進(jìn)云安全研究與實(shí)踐
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)