This repository contains research and testing related to web security, including:
- Stored DOM-based XSS Attack
- Website Vulnerability Scanning using Netsparker
- Security Report Generation
Each task is documented with steps and results.
To exploit a stored DOM-based XSS vulnerability in the blog comment functionality of a target website.
- Visit the vulnerable website (PortSwigger Lab).
- Locate the comment section and enter the following payload:
<><img src=1 onerror=alert(1)>
- Submit the comment.
- Reload the page and verify that the alert box appears, confirming the XSS execution.
- If not visible, inspect the DOM elements to confirm the injection.
- Successfully bypassed the website's replace() function-based XSS protection.
- Stored XSS executed upon loading the affected page.
Perform a security assessment of testasp.vulnweb.com using Netsparker.
- Critical: Out-of-band SQL Injection
- High: Passwords transmitted over HTTP
- Medium: Possible Cross-Site Request Forgery (CSRF)
- Low: Outdated IIS version detected
- Informational: Cookies missing
HttpOnlyflag, Windows Short Filename disclosure
- The scan detected 84 security issues, with a mix of critical, high, medium, and low-risk vulnerabilities.
- Detailed report generated for analysis.
Compile a professional-style security report summarizing the findings from the vulnerability scan.
- Target Website:
testasp.vulnweb.com - Scan Summary: Number of vulnerabilities categorized by severity
- Key Findings: SQL injection, XSS, CSRF, outdated technologies
- Remediation Recommendations: Secure password transmission, input validation, CSRF protection, server updates
- A structured report was generated summarizing all vulnerabilities and their impacts.
- Ready for submission or further analysis.
This repository serves as documentation of our web security research activities. The steps outlined can be used for further security testing, ethical hacking, and cybersecurity learning.
This project is for educational and ethical hacking purposes only. Do not perform security testing on any system without explicit permission.
[github.com/phoenixdev-512]