Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit 5749fb8

Browse files
committed
add note about <script> tag
1 parent b4c7f5f commit 5749fb8

File tree

5 files changed

+20
-0
lines changed

5 files changed

+20
-0
lines changed

‎exercises/01/problem.md‎

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,7 @@ If you were truly evil, you could share that URL on social media and when innoce
2121
You should try copying this URL and opening it into a new tab and confirm that your attack code runs immediately when the page is loaded. This is the power of Reflected XSS!
2222

2323
Before you move on to the next exercise, remember to copy your "attack input" (the malicious input string, not the URL) into the `SOLUTIONS.md` file so you can submit it and get credit.
24+
25+
## Note
26+
27+
You must use a `<script>` tag in your solution.

‎exercises/02/problem.md‎

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,3 +23,7 @@ You should be able to make a small change to your "attack input" from the last e
2323
<iframe src='http://caloogle.xyz:4020'></iframe>
2424

2525
Before you move on to the next exercise, remember to copy your "attack input" (the malicious input string, not the URL) into the `SOLUTIONS.md` file.
26+
27+
## Note
28+
29+
You must use a `<script>` tag in your solution.

‎exercises/03/problem.md‎

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,7 @@ Can you think of a way to defeat their improved sanitization code and get your `
2121
<iframe src='http://caloogle.xyz:4030'></iframe>
2222

2323
Before you move on to the next exercise, remember to copy your "attack input" (the malicious input string, not the URL) into the `SOLUTIONS.md` file.
24+
25+
## Note
26+
27+
You must use a `<script>` tag in your solution.

‎exercises/04/problem.md‎

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,3 +25,7 @@ Can you think of a way to defeat their improved sanitization code and get your `
2525
<iframe src='http://caloogle.xyz:4040'></iframe>
2626

2727
Before you move on to the next exercise, remember to copy your "attack input" (the malicious input string, not the URL) into the `SOLUTIONS.md` file.
28+
29+
## Note
30+
31+
You must use a `<script>` tag in your solution.

‎exercises/05/problem.md‎

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,3 +23,7 @@ Can you think of a way to defeat their improved sanitization code and get your `
2323
<iframe src='http://caloogle.xyz:4050'></iframe>
2424

2525
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.
26+
27+
## Note
28+
29+
You must use a `<script>` tag in your solution.

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /