diff --git a/DNS Rebinding/README.md b/DNS Rebinding/README.md index c35ddaa..4391b6c 100644 --- a/DNS Rebinding/README.md +++ b/DNS Rebinding/README.md @@ -7,6 +7,7 @@ * [Tools](#tools) * [Exploitation](#exploitation) * [Protection Bypasses](#protection-bypasses) +* [References](#references) ## Tools diff --git a/Dom Clobbering/README.md b/Dom Clobbering/README.md new file mode 100644 index 0000000..70a80f8 --- /dev/null +++ b/Dom Clobbering/README.md @@ -0,0 +1,132 @@ +# Dom Clobbering + +> DOM Clobbering is a technique where global variables can be overwritten or "clobbered" by naming HTML elements with certain IDs or names. This can cause unexpected behavior in scripts and potentially lead to security vulnerabilities. + +## Summary + +* [Lab](#lab) +* [Exploit](#exploit) +* [References](#references) + + +## Lab + +* [Lab: Exploiting DOM clobbering to enable XSS](https://portswigger.net/web-security/dom-based/dom-clobbering/lab-dom-xss-exploiting-dom-clobbering) +* [Lab: Clobbering DOM attributes to bypass HTML filters](https://portswigger.net/web-security/dom-based/dom-clobbering/lab-dom-clobbering-attributes-to-bypass-html-filters) +* [Lab: DOM clobbering test case protected by CSP](https://portswigger-labs.net/dom-invader/testcases/augmented-dom-script-dom-clobbering-csp/) + +## Exploit + +Exploitation requires any kind of `HTML injection` in the page. + +* Clobbering `x.y.value` + ```html + // Payload +