webPromedium
Lab 73 — NetShield — Reflected XSS via 404 Page Attribute Injection
hackadvisor
Task: NetShield DNS monitoring dashboard reflects URL path unescaped into body tag class attribute on 404 pages; admin bot visits reported URLs. Solution: HTML attribute injection breaks out of class attribute to inject onload handler that exfiltrates admin cookie via same-origin feedback API.
$ ls tags/ techniques/
nodejsxsscookie_stealingexpresshoneypotadmin_botreflected_xssdecoy_flagsame_origin_exfiltrationattribute_injection404_pagebody_tag_injectiononload_event
admin_bot_exploitationreflected_xss_via_attribute_injectionhtml_attribute_breakoutsame_origin_cookie_exfiltrationbody_onload_event_injectionurl_encoding_payload_delivery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 80 — GateGuard — SQL Injection in Organization Filter API— hackadvisor
- [web][Pro]Lab 231 — PagePulse — XSS via Web Cache Poisoning— hackadvisor
- [web][Pro]Lab 322 — NetPulse — IP Spoofing to RCE via Polling Agent API— hackadvisor
- [web][Pro]Board of Secrets Revenge— miptctf
- [web][Pro]Lab 326 — PulseBoard — NoSQL Injection in Authentication— hackadvisor