Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit bafe578

Browse files
committed
Switch to caloogle.xyz
1 parent 376ec2e commit bafe578

File tree

16 files changed

+16
-16
lines changed

16 files changed

+16
-16
lines changed

‎exercises/01/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ You decide to check out their website and look for a Reflected XSS vulnerability
1212

1313
Find a way to inject a `<script>` tag into your competitor's site. Once you find a way to execute code on their site, you should call the `success()` function. If you've done it correctly, you should see a browser alert telling you that you succeeded.
1414

15-
<iframe src='http://localhost:4010'></iframe>
15+
<iframe src='http://caloogle.xyz:4010'></iframe>
1616

1717
Since this is a Reflected XSS attack, take note of the fact that the URL of the victim site contains a URL-encoded version of your "attack input".
1818

‎exercises/02/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,6 @@ router.get('/search', async (req, res) => {
2020

2121
You should be able to make a small change to your "attack input" from the last exercise and your Reflected XSS attack should continue to work against their users. Unleash more `<script>` pwnage!
2222

23-
<iframe src='http://localhost:4020'></iframe>
23+
<iframe src='http://caloogle.xyz:4020'></iframe>
2424

2525
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.

‎exercises/03/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,6 @@ router.get('/search', async (req, res) => {
1818

1919
Can you think of a way to defeat their improved sanitization code and get your `<script>` tag into the page using the search input field?
2020

21-
<iframe src='http://localhost:4030'></iframe>
21+
<iframe src='http://caloogle.xyz:4030'></iframe>
2222

2323
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.

‎exercises/04/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,6 @@ router.get('/search', async (req, res) => {
2222

2323
Can you think of a way to defeat their improved sanitization code and get your `<script>` tag into the page using the search input field?
2424

25-
<iframe src='http://localhost:4040'></iframe>
25+
<iframe src='http://caloogle.xyz:4040'></iframe>
2626

2727
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.

‎exercises/05/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,6 @@ router.get('/search', async (req, res) => {
2020

2121
Can you think of a way to defeat their improved sanitization code and get your `<script>` tag into the page using the search input field?
2222

23-
<iframe src='http://localhost:4050'></iframe>
23+
<iframe src='http://caloogle.xyz:4050'></iframe>
2424

2525
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.

‎exercises/06/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,6 @@ router.get('/search', async (req, res) => {
2222

2323
Find the XSS vulnerability in the search input field. You should **not** use a `<script>` tag in this attack.
2424

25-
<iframe src='http://localhost:4060'></iframe>
25+
<iframe src='http://caloogle.xyz:4060'></iframe>
2626

2727
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.

‎exercises/07/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,6 @@ router.get('/search', async (req, res) => {
2222

2323
Find the XSS vulnerability in the search input field. You should **not** use a `<script>` tag in this attack.
2424

25-
<iframe src='http://localhost:4070'></iframe>
25+
<iframe src='http://caloogle.xyz:4070'></iframe>
2626

2727
Before you move on to the next exercise, remember to copy your "attack input" into the `SOLUTIONS.md` file.

‎exercises/08/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,6 @@ Note: Do not attempt to look at the server's **server-side source code** to see
2020

2121
Try submitting various inputs and then look at the HTML source of the `<iframe>` to figure out what their sanitization code must be doing.
2222

23-
<iframe src='http://localhost:4080'></iframe>
23+
<iframe src='http://caloogle.xyz:4080'></iframe>
2424

2525
Before you move on to the next exercise, remember to copy your "attack input" as well as your server code into the `SOLUTIONS.md` file.

‎exercises/10/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,6 @@ But upon closer inspection, it appears that they're not using the function corre
1818

1919
Try submitting various inputs and then look at the HTML source of the `<iframe>` to figure out what their sanitization code must be doing.
2020

21-
<iframe src='http://localhost:4100'></iframe>
21+
<iframe src='http://caloogle.xyz:4100'></iframe>
2222

2323
Before you move on to the next exercise, remember to copy your "attack input" as well as your server code into the `SOLUTIONS.md` file.

‎exercises/11/problem.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,6 @@ But, in their haste, they seem to have forgotten to think of all the cases... to
1212

1313
1. Write out the code that you believe the server must be executing to process the input.
1414

15-
<iframe src='http://localhost:4110'></iframe>
15+
<iframe src='http://caloogle.xyz:4110'></iframe>
1616

1717
Before you move on to the next exercise, remember to copy your "attack input" as well as your server code into the `SOLUTIONS.md` file.

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /