KPlus33 Profile Banner
ただのサラリーマン🍨 Profile
ただのサラリーマン🍨

@KPlus33

Followers
617
Following
15K
Media
103
Statuses
1K

少しずつHackTheBoxを攻略しています。難しいと感じたのでTryHackMeに勉強の場所を移しました。

Joined September 2019
Don't wanna be here? Send us removal request.
@KPlus33
ただのサラリーマン🍨
4 days
RT @tkzwgrs: 【未来】🇨🇳中国の大学生(工学部)がドローン技術を応用して“命令に応じて自由自在に浮遊する剣”の製作に成功.男子なら絶対にテンション上げざるを得ないハイクオリティな仕上がりに…. #本日の謎技術.
0
5K
0
@KPlus33
ただのサラリーマン🍨
10 days
I completed the Web Security Academy lab:.Exploiting cross-site scripting to steal cookies. csrfとxssの組み合わせ。楽しかった。. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a stored XSS vulnerability in the blog comments function. A simulated victim user views all comments after they are posted. To solve the ...
0
0
5
@KPlus33
ただのサラリーマン🍨
16 days
I completed the Web Security Academy lab:.Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped. ECMAScript 2015より定義されたテンプレートリテラル${alert()}. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a reflected cross-site scripting vulnerability in the search blog functionality. The reflection occurs inside a template string with angle ...
0
0
2
@KPlus33
ただのサラリーマン🍨
18 days
I completed the Web Security Academy lab:.Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a stored cross-site scripting vulnerability in the comment functionality. To solve this lab, submit a comment that calls the alert ...
0
0
6
@KPlus33
ただのサラリーマン🍨
18 days
I completed the Web Security Academy lab:.Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a reflected cross-site scripting vulnerability in the search query tracking functionality where angle brackets and double are HTML encoded ...
0
0
6
@KPlus33
ただのサラリーマン🍨
18 days
I completed the Web Security Academy lab:.Reflected XSS into a JavaScript string with angle brackets HTML encoded. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a reflected cross-site scripting vulnerability in the search query tracking functionality where angle brackets are encoded. The reflection ...
0
0
5
@KPlus33
ただのサラリーマン🍨
19 days
I completed the Web Security Academy lab:.Reflected XSS into a JavaScript string with single quote and backslash escaped. </script>タグで閉じてHTMLタグを書ける. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a reflected cross-site scripting vulnerability in the search query tracking functionality. The reflection occurs inside a JavaScript ...
0
0
4
@KPlus33
ただのサラリーマン🍨
20 days
I completed the Web Security Academy lab:.Reflected XSS in canonical link tag. canonicalのhrefの作られ方を確認して流し込む. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab reflects user input in a canonical link tag and escapes angle brackets. To solve the lab, perform a cross-site scripting attack on the home page ...
1
0
1
@KPlus33
ただのサラリーマン🍨
21 days
I completed the Web Security Academy lab:.Reflected XSS with some SVG markup allowed. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab has a simple reflected XSS vulnerability. The site is blocking common tags but misses some SVG tags and events. To solve the lab, perform a ...
0
0
9
@KPlus33
ただのサラリーマン🍨
21 days
I completed the Web Security Academy lab:.Stored XSS into anchor href attribute with double quotes HTML-encoded. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a stored cross-site scripting vulnerability in the comment functionality. To solve this lab, submit a comment that calls the alert ...
0
0
5
@KPlus33
ただのサラリーマン🍨
22 days
I completed the Web Security Academy lab:.Reflected XSS into attribute with angle brackets HTML-encoded. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a reflected cross-site scripting vulnerability in the search blog functionality where angle brackets are HTML-encoded. To solve this lab, ...
0
0
6
@KPlus33
ただのサラリーマン🍨
22 days
I completed the Web Security Academy lab:.Reflected XSS into HTML context with all tags blocked except custom ones. <script>window.location=<xss id=a onfocus=alert() tabindex=1</script>. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab blocks all HTML tags except custom ones. To solve the lab, perform a cross-site scripting attack that injects a custom tag and automatically alerts ...
0
0
4
@KPlus33
ただのサラリーマン🍨
25 days
RT @taichikawazoe: 野溝のみぞうさん@nomizoooneの著書「7日間でハッキングをはじめる本」読んでから.1年経たずにバグバウンティプログラムて脆弱性を発見し、….
0
17
0
@KPlus33
ただのサラリーマン🍨
25 days
I completed the Web Security Academy lab:.Reflected XSS into HTML context with most tags and attributes blocked. <iframe src="XXX?search=<body onresize=1>" onload="width='200px'"></iframe>. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a reflected XSS vulnerability in the search functionality but uses a web application firewall (WAF) to protect against common XSS vectors. ...
0
1
4
@KPlus33
ただのサラリーマン🍨
28 days
I completed the Web Security Academy lab:.DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded. @WebSecAcademy.
Tweet card summary image
portswigger.net
This lab contains a DOM-based cross-site scripting vulnerability in a AngularJS expression within the search functionality. AngularJS is a popular ...
0
0
6
@KPlus33
ただのサラリーマン🍨
2 months
◆ ディズニー ベイマックス・リトルグリーンメン 2個セット◆(¥1,080)がフリマアプリ ラクマで販売中♪ #rakuma #ラクマ
0
0
2
@KPlus33
ただのサラリーマン🍨
2 months
「◆ サンリオ アイスクリーム 5個セッ… (¥2,180)」を.#ヤフーフリマ で販売中!.【6/30まで】アプリをまだ持ってなかったら、紹介コード「NHQJEM」入力で、500円相当もらえるよ!※条件・上限あり.アプリのインストールはこちらから⬇.
Tweet card summary image
app.adjust.com
0
0
0