Do u all know what is Cross Site Scripting (XSS)
Do u all know what is Cross Site Scripting (XSS)
If not then here is the post
Written by #Abishiekh_Jain
Cross Site Scripting (XSS) is a vulnerability found in websites which allows an malicious attack/cracker to inject client-side scripts into the web pages. By using this vulnerability an attaker can deface a website, redirection attacks can be done and session cookie stealing is also possiable by exploiting this vulnerability.
There are two types of XSS vulnerability found in web applications.
1. Non-persistent
2. Persistent
Non-persistent
Non-persistent type of XSS vulnerability is the most comman one. Non-persistent XSS happens when a malicious HTML query is done by an attacker and that query is used immiediatly by the server-side to generate the page result.
Persistent
Persistent type of XSS vulnerability is a dangerous kind of vulnerability. This happens when a malicious HTML query is done by the attacker and that query is immediatly saved by the server and is permanently displayed on the normal pages.
In this tutorial I'm going to show you how to deface a XSS vulnerable site via Non-persistent XSS vulnerabillty.
In order to find sites vulnerable to XSS use google dorks. The most comman google dork used by attackers to exploit the XSS vulnerability is:
inurl:search.php?q=
How to find if the website is XSS vulnerable or not. Example Website: "www.website.com/search.php?q"
Open the website, you will find a search box. in that search box type this code:
<script>alert("XSS Detected !!")</script>
And click on search. If the site is vulnerable, you will get a Jquery box saying "XSS Detected", if you got that you can move foreward to deface the website site.
Now if you want just to display a simple message like "H4CK3D", Enter the below HTML code and click on search.
<h1><center><b>Hacked by H@x0r_C0d3/K!lL</h1></center></b>
Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)
Email me atGuran
Search
Blogroll
© 2014 by Guran Cosmin.
You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.
Pictures
Become a Fan
Find Us On Facebook
Contact Form
Video
720x90 AdSpace
Recent Videos
Movie
Wikipedia
Popular Posts
-
Tare !!!(guta mititel ) continuare
-
#unuro The Google Black Holes Code: inurl:"view.asp?page=" intext:"plymouth" >>Ok what this code does? So thi...
-
You can press these buttons on your keyboard to use Facebook faster. j , k — Scroll between News Feed stories p — Post a new status l — Li...
-
//// What is DNS ///// Did you know you could be connected to facebook.com – and see facebook.com in your web browser’s address bar – whil...
-
10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are plannin...
-
Your blog is your personal online diary which combines the text, images and other media, and links to other blogs, web p...
-
What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies What is Role Of Cookie,types, uses, setting and Privacy Conce...
-
(5) KING OF HACKERS How to Lock Drive of Remote Windows 10/8/7 Victim PC https://www.youtube.com/watch?v=4CgNDXKXxVo Facebook fan page : htt...
-
What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public ne...
-
(5) For Indians! Happy Diwali in Batch Style! :P ;)... - Legendary Hacking Learners For Indians! Happy Diwali in Batch Style! @echo off colo...
Followers
Contributors
Archive
-
▼
2014
(1156)
-
▼
November
(633)
- 20 Facebook Tips And Tricks You Should Know
- Thirty competition like Facebook penetration method
- How to build own Operating System..
- To make an account on Facebook to avoid closing ht...
- How to download an APK from Google Play using a we...
- Hack Remote Windows
- https://www.youtube.com/watch?v=QIrXVXVV_G8
- Want to be anonymous online to view blocked websites
- SteamOS is a Debian
- gلا تنسى الاشتراك في القناة ليصلك كل جديد .
- Use Gmail without internet on Chrome
- What is a VPN and how does it work
- Program wifiprotector protection aloivi hack
- [FAST HACKING] Remote Exploit in Internet Explorer
- Windows system key combinations
- http://www.wirelessdomination.com/how-to-crack-wpa...
- http://www.youtube.com/watch…
- The software developer to penetrate networks with wps
- https://www.youtube.com/watch?v=LQ0b2O5Ut-k&list=U...
- http://wizarg.blogspot.ro/2014/11/cheat-8-ball-poo...
- udptunnel
- Program activation of Windows 8-7-xp just installe...
- Lesson 2 of python:).. If less interaction with un...
- https://www.youtube.com/watch?v=W5mL1zynPbU&featur...
- How to spy on the menmak Web https
- فية اضافة الثغرات ميتاسبلويت على الكالي لينكس How ...
- Hack Giftcode 2014 1. Login with Facebook Account
- http://hackerzzworlds.blogspot.in/2014/11/wakpa-ht...
- Making application to fetch the icon shows your ba...
- http://worldwideprogramers.blogspot.in/2013/06/101...
- "HOW TO HACK FACEBOOK ACCOUNT ?
- Hacked by
- #AmnestyInternational backs #
- Episode 157 Virus Macker. program. Virus maker
- Very nice theme but frustrated me so much how to m...
- Hide Your Online Identity and Bypass Restrictions ...
- Bake or Fry your own Sweet Potato Fries!
- Here is an app which i found just one weak ago and...
- Fix Unable to Format Pen Drive Problem
- Block any websites in your Computer/Laptop without...
- Loophole XSS! Monument by older versions of 3.9.3 ...
- QL Injection stripslashes
- Best radio for listening to all radio stations in ...
- Yowindow program to learn about the weather in any...
- Best Ways to Make Money Online Withou
- TIP FOR NEW BLOGGERS - [FOR BEGINNERS] - TRAFFIC -...
- Tool from microsoft to download Windows 8.1 origin...
- Tutorial | Bypassing Firewall on a Web Server
- Code Injection Vulnerability
- Internet speed
- http://www.facebook.com/l.php?u=http%3A%2F%2Fstati...
- TweakMASTER program to pull the Internet speed of ...
- Prevent anyone to install any software on your com...
- The third lesson of the Linux install alkalai syst...
- Animated characters design program
- 3D Buttons Using CSS3 Tutorial
- Two programs to create PDF eBooks for easy
- Download Hippo Animator to create animated movies
- http://www.taqafa2.com/2014/11/free-3d-video-maker...
- Hours of free calls on your phone application down...
- detekt program to see if your country's Government...
- But skype forged program and all programs
- How To Learn HackiNg The 5 Most Basic Methods to S...
- Simply follow these Facebook hacking tips:
- Share your Web Browser from Web Screen Sharing Surfly
- Facebook Hacking 2014 that couldn't
- So here's our First n Vey Simple Youtube Video des...
- AndroidLesson101
- I hope that you like our vidiwa pursuit channel pl...
- How to remote shutdown pc using phone..
- *http://adf.ly/uSdsp :njrat_0.6.4 * http://adf.ly/...
- Top 5 Best Google Play App Store Alternatives
- How to remote shutdown pc using phone
- 3 infected sql sites 100%
- 100+ Best Run Commands List.
- 10 Reasons Why Pc Crashes
- @#[382445308500083:]
- How to Control Android Phone from PC using
- NOooooooo! Did you drop your precious cell phone i...
- Ghost Id Trick Or SIngle Name Trick
- How to turn off ur pc in 12 seconds
- Lista tuturor codurilor secrete pentru Android
- RED TEXT
- https://www.youtube.com/watch?v=dKOonaPziU4
- ShutDown Virus The code here are used for Educatio...
- Hack Any WI-FI nearby You...!!!
- You can press these buttons on your keyboard to us...
- Facebook Pending Friends Requests Removal
- No title
- Harvest Emails from Website Like
- Dos Attack On Your Computer Crashing Windows
- describe the oldest method of hacking facebook
- Windows Phone 8.1 Hacked.
- How to "Delete administrator Password"
- SAMSUNG USEFULL CODES
- Getting your own USA Phone Number
- Fb name toxic step
- Facebook name 1 case-sensitive:
- Fb name special characters first you need a PC to ...
- Pentru situația în care pescuim la crap pe o apă rece
-
▼
November
(633)
0 comments:
Post a Comment