본문 바로가기

Wargame(hacking)

(112)
Lab: DOM XSS in innerHTML sink using source location.search https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-innerhtml-sink Lab: DOM XSS in innerHTML sink using source location.search | Web Security Academy This lab contains a DOM-based cross-site scripting vulnerability in the search blog functionality. It uses an innerHTML assignment, which changes the HTML ... portswigger.net 위 코드는 해당 페이지의 구문이다. 해당 search for..
Lab: Manipulating the WebSocket handshake to exploit vulnerabilities https://portswigger.net/web-security/websockets/lab-manipulating-handshake-to-exploit-vulnerabilities Lab: Manipulating the WebSocket handshake to exploit vulnerabilities | Web Security Academy This online shop has a live chat feature implemented using WebSockets. It has an aggressive but flawed XSS filter. To solve the lab, use a WebSocket message ... portswigger.net 위 그림 1의..
Lab: SSRF with blacklist-based input filter https://portswigger.net/web-security/ssrf/lab-ssrf-with-blacklist-filter Lab: SSRF with blacklist-based input filter | Web Security Academy This lab has a stock check feature which fetches data from an internal system. To solve the lab, change the stock check URL to access the admin interface at ... portswigger.net http://localhost 요청과 http://127.0.0.1 요청 모두 차단되어 진다. 그래서 아래 그..
Lab: Basic SSRF against the local server https://portswigger.net/web-security/ssrf/lab-basic-ssrf-against-localhost Lab: Basic SSRF against the local server | Web Security Academy This lab has a stock check feature which fetches data from an internal system. To solve the lab, change the stock check URL to access the admin interface at ... portswigger.net 재고 확인을 위해 Check stock을 누르면 POST 요청이 발생하고, stockApi 매개변수로 URL이 전달되어진다..
Lab: CSRF where token validation depends on request method https://portswigger.net/web-security/csrf/bypassing-token-validation/lab-token-validation-depends-on-request-method Lab: CSRF where token validation depends on request method | Web Security Academy This lab's email change functionality is vulnerable to CSRF. It attempts to block CSRF attacks, but only applies defenses to certain types of requests. To ... portswigger.net 해당 문제..
Lab: CSRF vulnerability with no defenses https://portswigger.net/web-security/csrf/lab-no-defenses Lab: CSRF vulnerability with no defenses | Web Security Academy This lab's email change functionality is vulnerable to CSRF. To solve the lab, craft some HTML that uses a CSRF attack to change the viewer's email address ... portswigger.net 해당 문제의 사이트에는 My Account page가 존재한다. 해당 페이지에서, email 업데이트 및 확인이 가능하다. email 업데이트 ..
Lab: DOM XSS in document.write sink using source location.search https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-document-write-sink Lab: DOM XSS in document.write sink using source location.search | Web Security Academy This lab contains a DOM-based cross-site scripting vulnerability in the search query tracking functionality. It uses the JavaScript document.write function, ... portswigger.net 해당 Search form에 XSS P..
Webhacking.kr : old-27