GitHub
github.com › wisec › domxsswiki
GitHub - wisec/domxsswiki: Automatically exported from code.google.com/p/domxsswiki · GitHub
DOM XSS Test Cases Wiki is a KB for defining sources of attacker controlled inputs and sinks which potentially could introduce DOM Based XSS issues.
Starred by 548 users
Forked by 79 users
Languages HTML
OWASP Foundation
owasp.org › www-community › attacks › DOM_Based_XSS
DOM Based XSS | OWASP Foundation
1. The DOM XSS Wiki - The start of a Knowledgebase for defining sources of attacker controlled inputs and sinks which could potentially introduce DOM Based XSS issues. Its very immature as of 11/17/2011.
Videos
08:41
❌ XSS Attacks Explained – How HACKERS steal data with one line ...
02:18
Testing for DOM XSS with DOM Invader - YouTube
29:07
Stored, Blind, Reflected and DOM - Everything Cross--Site Scripting ...
02:56
Testing for web message DOM XSS with DOM Invader - YouTube
22:23
Analysing the DOM to find Reflected XSS - YouTube
06:59
DOM Based XSS Attack Demonstration - YouTube
Google Code
code.google.com › archive › p › domxsswiki › wikis › Introduction.wiki
Google Code Archive - Long-term storage for Google Code Project Hosting.
Archive · Skip to content · The Google Code Archive requires JavaScript to be enabled in your browser · Google · About Google · Privacy · Terms
Haxoris
haxoris.com › haxoris-wiki › web-owasp-top-10 › injection › dom-based-xss
DOM-Based Cross-Site Scripting (XSS) - Haxoris Wiki
DOM-based Cross-Site Scripting (XSS) is a variant of XSS where the entire exploit occurs in the Document Object Model (DOM) within the victim's browser, without sending malicious data to the server.
MediaWiki
mediawiki.org › wiki › DOM-based_XSS
DOM-based XSS - MediaWiki
DOM-based XSS (or type-0 XSS) is a type of Cross-site scripting attack that occurs when client-side scripts (such as JavaScript) manipulate the page's DOM, allowing an attacker to run JavaScript in the victim's browser.
GitHub
github.com › trucpt › DOMXSSWiki
GitHub - trucpt/DOMXSSWiki: https://code.google.com/archive/p/domxsswiki/
The DOMXSS Wiki is a Knowledge Base for defining sources of attacker controlled inputs and sinks which potentially could introduce DOM Based XSS issues.
Author trucpt
GitHub
github.com › wisec › domxsswiki › wiki
Home · wisec/domxsswiki Wiki · GitHub
The DOMXSS Wiki is a Knowledge Base for defining sources of attacker controlled inputs and sinks which potentially could introduce DOM Based XSS issues.
Author wisec
Wikipedia
en.wikipedia.org › wiki › Cross-site_scripting
Cross-site scripting - Wikipedia
3 weeks ago - As the JavaScript code was also processing user input and rendering it in the web page content, a new sub-class of reflected XSS attacks started to appear that was called DOM-based cross-site scripting. In a DOM-based XSS attack, the malicious data does not touch the web server.
HackTricks
book.hacktricks.xyz › home › pentesting web › xss cross site scripting › dom xss
DOM XSS - HackTricks
This kind of XSS is probably the hardest to find, as you need to look inside the JS code, see if it’s using any object whose value you control, and in that case, see if there is any way to abuse it to execute arbitrary JS. https://github.com/mozilla/eslint-plugin-no-unsanitized · Browser extension to check every data taht reaches a potential sink: https://github.com/kevin-mizu/domloggerpp
PortSwigger
portswigger.net › web-security › cross-site-scripting › dom-based
What is DOM-based XSS (cross-site scripting)? Tutorial & Examples | Web Security Academy
In this section, we'll describe DOM-based cross-site scripting (DOM XSS), explain how to find DOM XSS vulnerabilities, and talk about how to exploit DOM XSS with different sources and sinks.
CQR
cqr.company › web-vulnerabilities › dom-xss-using-web-messages-and-a-javascript-url
Wiki | DOM XSS using web messages and a JavaScript URL | CQR
DOM XSS using web messages and a JavaScript URL represents a critical security vulnerability that allows attackers to inject and execute malicious scripts within the Document Object Model (DOM) of a web application.
OWASP Cheat Sheet Series
cheatsheetseries.owasp.org › cheatsheets › DOM_based_XSS_Prevention_Cheat_Sheet.html
DOM based XSS Prevention - OWASP Cheat Sheet Series
The difference between Reflected/Stored XSS is where the attack is added or injected into the application. With Reflected/Stored the attack is injected into the application during server-side processing of requests where untrusted input is dynamically added to HTML. For DOM XSS, the attack is injected into the application during runtime in the client directly.
CQR
cqr.company › web-vulnerabilities › clickjacking-chained-with-dom-based-xss
Wiki | Clickjacking chained with DOM-Based XSS | CQR
Description: DOM-Based XSS occurs when a web application’s client-side scripts manipulate the Document Object Model (DOM) in an insecure way, allowing an attacker to inject malicious scripts that can be executed in the context of the user’s browser.