OWASP Security Shepherd Project - Cross Site Scripting 4 (XSS Challenge)

Challenge


Solution

    First, because it is require to input an URL, we should try to find out that what is the minimum requirement to pass this application's URL validation.


    We notice that we could pass the validation by only inputting http.
    Based on above finding, the next question we need to consider is how could we make the input work/look like <IMG SRC="#" ONERROR="alert('XSS')"/>.
    Try to input http" ONERROR=alert('XSS').
 

    It seems that ON has been encoded with HTML for escape the character. Maybe we should try the lower case one. Try input http" onerror=alert('XSS').



    Encoded as HTML again... As a result, we should try combine lower case and upper case. Input http" oNerror=alert('XSS').

    We complete the challenge!

留言

  1. i am unable to intercept the ctf site. Rest sites are working. I have also installed CA certificate in firefox still its not working. Need ur help

    回覆刪除
  2. Not sure what you mean about CTF site & Rest site.
    However, in order to intercept traffic using BurpSuite, you need to do the followings:
    1. Export Certificate from Burp
    2. Import the Burp Certificate to Firefox as Trusted Cert.
    3. Check the Burp listening port (Default value would be 127.0.0.1:8080)
    4. Config your browser to use proxy as the Burp listening port (Ex: 127.0.0.1:8080)

    Please refer to this link: https://support.portswigger.net/customer/portal/articles/1783118-getting-started-with-burp-proxy

    回覆刪除

張貼留言

Welcome to share your comments or questions : -)
Enjoy life!

The Hottest Articles

OWASP Security Shepherd Project - My Practice & Solutions

OSCP回顧 & 準備建議

OWASP Security Shepherd Project - SQL Injection 3 (Injection Challenge)