19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 12 n Attacking Users: Cross-Site Scripting 499<br />

7. Name three possible attack payloads for XSS exploits (that is, <strong>the</strong> malicious<br />

actions that you can perform within ano<strong>the</strong>r user’s browser, not <strong>the</strong><br />

methods by which you deliver <strong>the</strong> attacks).<br />

8. You have discovered a reflected XSS vulnerability where you can inject<br />

arbitrary data into a single location within <strong>the</strong> HTML of <strong>the</strong> returned<br />

page. The data inserted is truncated to 50 bytes, but you want to inject a<br />

lengthy script. You prefer not to call out to a script on an external server.<br />

How can you work around <strong>the</strong> length limit?<br />

9. You discover a reflected XSS flaw in a request that must use <strong>the</strong> POST<br />

method. What delivery mechanisms are feasible for performing an attack?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!