Page 87 - Hands-On Bug Hunting for Penetration Testers
P. 87

Unsanitized Data – An XSS Case Study                                 Chapter 4

            Summary

            This chapter covered the different types of XSS attacks, understanding the anatomy of an
            XSS snippet, and extending Burp Suite with XSS Validator to confirm successful injection
            attempts. We also look at using Google Gruyere as a teaching aide and testing ground, and
            reported an XSS vulnerability from start to finish, including how to document your report
            and a sample submission.



            Questions


                   1.  What are the different principle types of XSS?
                   2.  Which XSS varieties are most dangerous/impactful?
                   3.  What's the value of XSS Validator as an extension?
                   4.  What does the QIBOUPNKT server do?
                   5.  How do you select payloads for fuzzing in Burp Intruder?
                   6.  What are the most important things to include about XSS in your submission
                      report?
                   7.  What's a worst-case attack scenario for a hacker who's found an XSS bug to
                      exploit?
                   8.  Why is including an attack scenario in your report submission important?



            Further Reading

            You can find out more about some of the topics we have discussed in this chapter at:

                      XSS Filter Evasion Cheat Sheet: IUUQT   XXX PXBTQ PSH JOEFY QIQ 944@
                      'JMUFS@&WBTJPO@$IFBU@4IFFU
                      XSS Challenges: IUUQT   YTT RVJ[ JOU  I KQ
                      XSS Game: IUUQT   YTT HBNF BQQTQPU DPN














                                                    [ 72 ]
   82   83   84   85   86   87   88   89   90   91   92