Cross-site scripting (XSS)
Understanding Cross-Site Scripting
What is XSS?
Vulnerable Code Example
// PHP vulnerable code
$search = $_GET['search'];
echo "<div>Search results for: " . $search . "</div>";How XSS Works
Common Vulnerable Input Points
GET Parameters
POST Parameters
HTTP Headers
Cookies
WebSocket Messages
XSS Detection Methodology
Manual Detection Techniques
Basic Syntax Testing
Script Tag Testing
Context-Specific Testing
Response Analysis Techniques
Stored XSS (Persistent)
Detection and Baseline Establishment
Identifying Storage Points
Message Boards and Chat Systems
File Upload Systems
Exploitation Strategies
Multi-User Impact Testing
Persistent Session Hijacking
Reflected XSS (Non-Persistent)
Detection Methodology
Parameter-Based Detection
Error Message Exploitation
Exploitation Techniques
URL-Based Attack Vectors
Social Engineering Delivery
Form-Based Reflection Attacks
DOM-based XSS
Source and Sink Analysis
Identifying DOM Sources
Identifying DOM Sinks
Client-Side Template Injection
AngularJS Template Injection
Vue.js Template Injection
Advanced DOM Exploitation
JavaScript Framework Exploitation
Browser API Exploitation
XSS Payload Arsenal
Basic Payloads
Alert Box Payloads
Event Handler Payloads
Context-Specific Payloads
HTML Context Payloads
Attribute Context Payloads
JavaScript Context Payloads
CSS Context Payloads
Advanced Payloads
Cookie Stealing Payloads
Session Hijacking Payloads
Credential Harvesting Payloads
Keylogger Payloads
Filter Evasion & Bypass Techniques
Filter Analysis & Bypass Strategies
Case Manipulation Bypasses
HTML Entity Encoding Bypasses
URL Encoding Bypasses
Unicode and UTF-8 Bypasses
Whitespace and Character Bypasses
WAF Circumvention Techniques
Comment-Based WAF Bypasses
Attribute Delimiter Bypasses
Tag Structure Bypasses
Alternative Event Handlers
Encoding & Obfuscation Methods
JavaScript Obfuscation
Alternative JavaScript Execution
CSS-Based Bypasses
Blind XSS
Detection Techniques
Payload Deployment Strategies
Advanced Blind XSS Payloads
Exploitation Methods
Email System Exploitation
Log File Exploitation
Third-Party Integration Exploitation
Advanced XSS Techniques
XSS Chaining
Multi-Stage Attack Chains
Progressive Payload Loading
Post-Exploitation Techniques
Persistent Access Methods
Advanced Data Exfiltration
Browser Exploitation
Last updated
Was this helpful?