[Full-disclosure] Cross Site Scripting - Exploitation & Penetration Strings



Title:
======
Cross Site Scripting - Exploitation & Penetration Strings


Date:
=====
2012-04-23


References:
===========
Download: http://www.vulnerability-lab.com/resources/documents/531.txt



VL-ID:
=====
531


Status:
========
Published


Exploitation-Technique:
=======================
Sheets


Severity:
=========
High


Details:
========
A lot of people asked us regarding our cross site scripting pentest sheet for a fuzzer or own scripts. To have
some good results you can use the following list with automatic scripts, software or for manually pentesting. This
list goes out to all friends, nerds, pentester & exploiters. Please continue the List and we will update it soon.

Note: This is a technical attack sheet for cross site penetrationtests.


Credits:
========
Vulnerability Laboratory [Research Team]


Disclaimer:
===========
The information provided in this document is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.

Copyright © 2012 Vulnerability-Lab




--
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: research@xxxxxxxxxxxxxxxxxxxxx


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



Relevant Pages

  • Re: Level of Exploitation
    ... Cross Site Scripting attacks against the web application. ... Could you share your ideas about level of exploitation. ... can give for SQL Injection, Cross site scripting, buffer overflow, TCP ... Security Trends Report from Cenzic ...
    (Pen-Test)
  • Level of Exploitation
    ... I have come across a situation where I need to specify the "Level of Exploitation" to the client (a govt. ... I was able to do SQL Injection, Cross Site Scripting attacks against the web application. ... Security Trends Report from Cenzic ...
    (Pen-Test)