🏴☠️My XSS Attack Methodology
Blind XSS ----> https://xss.report/dashboard
Not found
Not found
How to check for Cross-Site-Scripting
----------------------------------------------------------------
My Strategy to find XSS
Note: Double URL encoding can be tried since the first decoding process is performed by HTTP protocol and the resultant encoded URL will bypass the XSS filter.
----------------------------------------------------------------
Bypass <script> Tags
<script> Tags----------------------------------------------------------------
To Bypass common xss tags filters like <script>, <img>, <a>, <body>…
<script>, <img>, <a>, <body>…----------------------------------------------------------------
Bypass using javascript inside a string
----------------------------------------------------------------
Bypass email filter
----------------------------------------------------------------
XSS Filter removes script characters Bypass
script characters Bypass----------------------------------------------------------------
XSS Filter removes alert characters Bypass
alert characters Bypassif a blacklisted word is “alert”,
----------------------------------------------------------------
XSS Filter removes Strings are blocked Bypass
Strings are blocked Bypass----------------------------------------------------------------
XSS Filter removes () characters Bypass alert`1`
() characters Bypass alert`1`----------------------------------------------------------------
XSS Filter removes <> characters Bypass
<> characters Bypass----------------------------------------------------------------
XSS Filter removes /[A-Za-z0-9]/ characters Bypass
/[A-Za-z0-9]/ characters Bypass- So we can use something like JSFuck, which converts your javascript code into valid non-alphanumeric esoteric javascript.
----------------------------------------------------------------
XSS Filter removes !-/#&;% characters and Sink in Comment "<!--<p> parameter value </p> -- >" Bypass
!-/#&;% characters and Sink in Comment "<!--<p> parameter value </p> -- >" Bypass----------------------------------------------------------------
XSS Filter removes `'"+-!\[] and alert characters Bypass
`'"+-!\[] and alert characters BypassOr
Or even better,
and then add #alert(1337) to the URL to make it work.
like: eval(location.hash.slice(1))#alert(document.cookie)
#alert(1337) to the URL to make it work.
like: eval(location.hash.slice(1))#alert(document.cookie)Not found
----------------------------------------------------------------
XSS Filter DOMPurify.Sanitize Function Bypass
DOMPurify.Sanitize Function Bypass- So we can use DOM Clobbering. By injecting HTML elements into the DOM, we can create Javascript variables.
- So in our case, we need to create a variable
ok. To do so, we'll create an Anchor Tag because if we create an anchor tag with theidset took, then the browser automatically creates a variable namedokin Javascript.
Things to note:
----------------------------------------------------------------
Payload Encode to Bypass Firewall
----------------------------------------------------------------
Stored XSS in the address field in billing activity at in Shopping Cart
----------------------------------------------------------------






TOP XSS Payloads
----------------------------------------------------------------
Bypass Filter for Stored DOM XSS
----------------------------------------------------------------
DOM XSS With JSON Request
----------------------------------------------------------------
DOM XSS in AngularJS
----------------------------------------------------------------
In JavaScript, several events can be used to trigger Cross-Site Scripting (XSS) payloads
These events can be used to trigger XSS payloads in different contexts, depending on the specific event and the structure of the HTML document..
----------------------------------------------------------------
Cross-site Scripting (XSS) Cheat Sheet
----------------------------------------------------------------
DOM-Based XSS Used the following JavaScript payloads:
----------------------------------------------------------------
Tip 2: when you see function redirect you but not reflected in source page try to but xss payload my you can get dom xss
Tip3: Always Check ?returnurl=, ?next= and other redirection parameters before login.
----------------------------------------------------------------
Automated XSS Finding ParamSpider | GXSS | Dalfox
----------------------------------------------------------------
Automated XSS Finding Waybackurls | Gf Pattern | Dalfox
----------------------------------------------------------------
Automated XSS Finding ParamSpider | kxss | Dalfox
----------------------------------------------------------------
(1) One-Liner XSS Finding
----------------------------------------------------------------
(2) One-Liner XSS Finding
----------------------------------------------------------------
(3) One-Liner XSS Finding
----------------------------------------------------------------
(4) One-Liner XSS Finding
----------------------------------------------------------------
(5) One-Liner XSS Finding
----------------------------------------------------------------
(6) One-Liner XSS Finding
----------------------------------------------------------------
(7) One-Liner XSS Finding
----------------------------------------------------------------
(8) One-Liner XSS Finding
----------------------------------------------------------------
(9) One-Liner XSS Finding
----------------------------------------------------------------
Last updated
