Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
The ha.ckers.org and sla.ckers.org web application security lab house rules and a place for you to introduce yourself if you like. 

Current Page: 1 of 1
Results 1 - 6 of 6
5 years ago
awk
Thank you nullmind and id :-)
Forum: Intro
5 years ago
awk
Thanks mario .. the solution was so in-the-face.. ughhh! -A
Forum: XSS Info
5 years ago
awk
wow! thanks.. its a useful list :-) However, I used the input= thingy because in the source html I can see the value passed to the backend has the name input. Its a param, and does not seem to correlate with a html tag. Do correct me if I am mistaken. I did try onmousemove etc.. but it makes no difference :-( Thanks, -A
Forum: XSS Info
5 years ago
awk
thornmaker Wrote: ------------------------------------------------------- > There might be an easier way to pass stage 6, but > read about how .mario xssed this registration page > for one such method Thanks thornmaker, I tried out input=" onload=alert(1) a=" but got nowhere. I also tried out the name.xss link described in the post, and ended up at the "bad boy&quo
Forum: XSS Info
5 years ago
awk
Hello, I am newbie with XSS and have reached level 6, but cannot get beyond it. From the description it seems that the script tags will be parsed out, and it is visible in the text reflected back on the screen. I have tried to use handlers like http://blogged-on.de/xss/6.maxsize.php?input="onload="decipher(document.forms...." which does not seem to work. Can someone
Forum: XSS Info
5 years ago
awk
Hi everyone. I've been reading up some posts on this forum and have found them to be very good. I am primarily interested in XSRF and XSS, but also dabble around with pen-testing. I'm not a security expert.. but looking to become one soon. -A
Forum: Intro
Current Page: 1 of 1