Skip to main content

Questions tagged [web]

1 vote
1 answer
123 views

Is there a way to exploit this DOM-based XSS in recent versions of browsers?

I am a beginner in web app pentesting. In this page, The client-controlled fragment identifier in URL is injected directly into the page DOM, permitting a DOM-based XSS, I think. I've tried many ...
mark coder's user avatar
2 votes
0 answers
91 views

new index.php trailing path attack, possibly directed at some framework

TL;DR: seeing a website attack that's new to us, wondering if it is a known thing, or if it's directed at some framework that we're not using. The attack is against a site's index.php script and feeds ...
Tom Swiss's user avatar
1 vote
1 answer
139 views

What are the risks of allowing outgoing traffic on all ports on a webserver? [duplicate]

If I have a webserver which allows outgoing traffic on all ports. What are the risks? I understand that incoming traffic should be limited to HTTPS, HTTP and other required ports for communication. I ...
lebicahl's user avatar
2 votes
1 answer
253 views

XSS CTF - How to execute payload inside an HTML comment (blacklisted words & encoded characters)

I'm trying to solve a CTF challenge that requires me to obtain the admin cookie through XSS. Here's the situation: -Main form: When I enter any input, it gets reflected in the page, but it is inserted ...
drmr's user avatar
  • 21
1 vote
0 answers
68 views

URL Redirection from Malicious Domain [closed]

My web application has been deployed using Apache 2.4.3 and PHP 7.4.2, and it is hosted on a public DNS. I received an advisory from a security firm indicating that my web application is being ...
Learner's user avatar
  • 11
1 vote
0 answers
157 views

How do tracking domains work, and how can they be detected?

I'm currently making a tracker blocklist and I'm curious about how to detect tracking domains. I tried to find anything useful about how these act or how to detect them but still nothing. I'm ...
user332362's user avatar
2 votes
1 answer
219 views

Does letting a website use the fonts on my computer pose any security or privacy threat?

Does letting a website use the fonts on my computer post any security or privacy threat? Example from https://acrobat.adobe.com/ accessed via Chrome on Windows 11: acrobat.adobe.com wants to Use the ...
Franck Dernoncourt's user avatar
1 vote
0 answers
194 views

Race condition in Python [closed]

I am trying to teach my students about race conditions on the web, and for that purpose, I am using a simple bank example, in which we transfer an amount from person A to Person B's account. If we use ...
Johnny's user avatar
  • 343
18 votes
7 answers
6k views

ELI5: If SSL encrypts traffic, why does it expire?

SSL, nowadays TLS, encrypts traffic between the server and client. However, the certificate is only valid for a certain period of time until its expiration. What I don't understand is, why does TLS ...
MaSc. H.'s user avatar
  • 321
5 votes
1 answer
2k views

What is the term for when a hyperlink maliciously opens different URL from URL displayed when hovered over?

Is there a term for when an anchor tag opens a different URL than its href or performs some action such as showing a pop-up instead of opening expected URL? Excluding non-malicious cases such as a ...
user43117's user avatar
0 votes
0 answers
155 views

Resources on best practices to support why we need to protect Web API

I am dealing with a coworker who keeps insisting there is no need to protect requests to our Web API. His rationale is, the only client to it (our Web front end) already makes sure only the authorized ...
ltree's user avatar
  • 1
0 votes
2 answers
274 views

Is There a way to exploiting / Make exploit scenario for Header based reflected XSS?

I've found a reflected XSS, but the problem is that the attack vector is the header (any header). Is there a way to develop an exploit scenario based on this?
0xdead 4f's user avatar
0 votes
0 answers
113 views

domain (active directory) machines accessible via web

I recently stumbled across customer machines (windows server) that were part of the customers active directory domain and also had IIS applications accessible for the www. I only have the vague ...
rominator007's user avatar
1 vote
0 answers
137 views

Newsletter Spam Attack - Somehow by not directly attacking?

Our website(shopify website) has been getting a bot attack on our newsletter subscription form. Not sure if emails are real or not but there is some from gmail and hotmail etc or some from weird ...
tarik's user avatar
  • 11
0 votes
0 answers
149 views

Methods to look for when checking if a javascript program is making network requests

I'm trying to quickly audit a js browser extension to see if it doesn't talk to the outside. Am I right in thinking that I can just grep the code for the following: XMLHttpRequest fetch $.ajax axios....
Scb's user avatar
  • 101

15 30 50 per page
1
2 3 4 5
18