May 2017
Intermediate to advanced
416 pages
21h 33m
English
$ nmap -p80 --script http-unsafe-output-escaping <target>
PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-unsafe-output-escaping: |_ Characters [> " '] reflected in parameter id at http://target/1.php?id=1
The script output will also include the vulnerable parameter and which characters were returned without being filtered or encoded.
$nmap -p80 --script http-phpself-xss,http-unsafe-output-escaping <target>
Against a web server with vulnerable files, you will see a similar ...
Read now
Unlock full access