In the following I want to introduce several so called “XSS Polyglots”. A XSS polyglot is an XSS attack vector which is able to execute in various contexts. Thus, one can inject less attack vectors, get a lot of attack surface covered and analyze the behavior of the application using less requests. Furthermore, as it covers several attack vectors in one, the probability to develop a successful attack vector increases. Another reason to use a XSS polyglot is to bypass the Content-Security-Policy (CSP), which is an added security layer for XSS detection and mitigation, provided by the browser.
A brute-force attack on passwords/usernames using a custom generated wordlist can be way more efficient than to use some standard wordfiles like for example the famous “rockyou.txt”. In the following I will share a technique to generate your own custom wordlist. First of all, you should gather some information about your target and analyze it. You are looking for most used words, hobbies and anything that your target could use in his password.
test
Object serialization is an important aspect of any non-trivial program. When running around through the jungle one easily encounters these types of files. As serialized files will get deserialized at some but by the application an interesting vulnerability comes into mind Insecure Object Deserialization. An Insecure Object Deserialization occurs when an application attempts to deserialize untrusted data. Without experience it can get pretty tricky to detect serialized files and thus one might overlook this type of vulnerability.