Questions tagged [web]
The web tag has no summary.
268 questions
1
vote
1
answer
123
views
Is there a way to exploit this DOM-based XSS in recent versions of browsers?
I am a beginner in web app pentesting.
In this page, The client-controlled fragment identifier in URL is injected directly into the page DOM, permitting a DOM-based XSS, I think.
I've tried many ...
2
votes
0
answers
91
views
new index.php trailing path attack, possibly directed at some framework
TL;DR: seeing a website attack that's new to us, wondering if it is a known thing, or if it's directed at some framework that we're not using. The attack is against a site's index.php script and feeds ...
1
vote
1
answer
139
views
What are the risks of allowing outgoing traffic on all ports on a webserver? [duplicate]
If I have a webserver which allows outgoing traffic on all ports. What are the risks?
I understand that incoming traffic should be limited to HTTPS, HTTP and other required ports for communication.
I ...
2
votes
1
answer
253
views
XSS CTF - How to execute payload inside an HTML comment (blacklisted words & encoded characters)
I'm trying to solve a CTF challenge that requires me to obtain the admin cookie through XSS. Here's the situation:
-Main form: When I enter any input, it gets reflected in the page, but it is inserted ...
1
vote
0
answers
68
views
URL Redirection from Malicious Domain [closed]
My web application has been deployed using Apache 2.4.3 and PHP 7.4.2, and it is hosted on a public DNS.
I received an advisory from a security firm indicating that my web application is being ...
1
vote
0
answers
157
views
How do tracking domains work, and how can they be detected?
I'm currently making a tracker blocklist and I'm curious about how to detect tracking domains. I tried to find anything useful about how these act or how to detect them but still nothing. I'm ...
2
votes
1
answer
219
views
Does letting a website use the fonts on my computer pose any security or privacy threat?
Does letting a website use the fonts on my computer post any security or privacy threat?
Example from https://acrobat.adobe.com/ accessed via Chrome on Windows 11:
acrobat.adobe.com wants to
Use the ...
1
vote
0
answers
194
views
Race condition in Python [closed]
I am trying to teach my students about race conditions on the web, and for that purpose, I am using a simple bank example, in which we transfer an amount from person A to Person B's account. If we use ...
18
votes
7
answers
6k
views
ELI5: If SSL encrypts traffic, why does it expire?
SSL, nowadays TLS, encrypts traffic between the server and client. However, the certificate is only valid for a certain period of time until its expiration.
What I don't understand is, why does TLS ...
5
votes
1
answer
2k
views
What is the term for when a hyperlink maliciously opens different URL from URL displayed when hovered over?
Is there a term for when an anchor tag opens a different URL than its href or performs some action such as showing a pop-up instead of opening expected URL?
Excluding non-malicious cases such as a ...
0
votes
0
answers
155
views
Resources on best practices to support why we need to protect Web API
I am dealing with a coworker who keeps insisting there is no need to protect requests to our Web API. His rationale is, the only client to it (our Web front end) already makes sure only the authorized ...
0
votes
2
answers
274
views
Is There a way to exploiting / Make exploit scenario for Header based reflected XSS?
I've found a reflected XSS, but the problem is that the attack vector is the header (any header). Is there a way to develop an exploit scenario based on this?
0
votes
0
answers
113
views
domain (active directory) machines accessible via web
I recently stumbled across customer machines (windows server) that were part of the customers active directory domain and also had IIS applications accessible for the www.
I only have the vague ...
1
vote
0
answers
137
views
Newsletter Spam Attack - Somehow by not directly attacking?
Our website(shopify website) has been getting a bot attack on our newsletter subscription form. Not sure if emails are real or not but there is some from gmail and hotmail etc or some from weird ...
0
votes
0
answers
149
views
Methods to look for when checking if a javascript program is making network requests
I'm trying to quickly audit a js browser extension to see if it doesn't talk to the outside. Am I right in thinking that I can just grep the code for the following:
XMLHttpRequest
fetch
$.ajax
axios....