Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
There's much to see here. So, take your time, look around, and learn all there is to know. I hope you enjoy the content!
Hello! In this educational video I'm use some features of Metasploit to create a staged payload and a listener. I then serve it to a target through a webserver I'm hosting.
Watch as I navigate a site configured by TryHackMe to inject some malicious Javascript into a user input field. By understanding how the input in handled, we can craft this payload to call back to our Netcat listener with the data (the users cookie) we want to retrieve.
Welcome to a basic room today on Burp Suite basics! We'll be doing a basic XSS injection with JavaScript which bypasses some client side filters to show a proof of concept that XSS injections are possible on the webserver.
Copyright © 2024 Axonia - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.