Blind [[XSS_HTML Injection]]
Replay Attacks
# Try token Re-Use # U send Message PUT /v1/api/messages/send?token=RWFzdGVyIGVnZyEgWW91RhdGEg= HTTP/1.1 Host: vulnlab.com Content-Type: application/json {βmsgβ: βHi there! I will meet you at my place at 9pm today..β} -------------------------------------- # U Then logout GET /v1/api/messages/logout?token=RWFzdGVyIGVnZyEgWW91RhdGEg= HTTP/1.1 Host: vulnlab.com Content-Type: application/json --------------------------------------------------------- We can then try to resend the request multiple times using the old token but with different messages. If the request was successful and no different status code was returned, it means we are able to flood the application using the session data of an old user.
Markup Language? try Create A picture that steals Data
Go to <https://iplogger.org/> choose invisible image send the message
[[XSS_HTML Injection|XSS_HTML Injection]] in email section
Last updated 10 months ago