Penetration Testing mailing list archives
xss....what next???
From: "Ahmad N" <ahmad1985 () gmail com>
Date: Mon, 14 Aug 2006 01:58:26 +0400
hello, I managed to find a website prone to xss, this might sound stupid, but whats next ??? how can i use it to the maximum ??? i managed to pass javascript to a jspz arguments.....but I really can't c how much potential i have now??? thx alot ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- xss....what next??? Ahmad N (Aug 13)
- Re: xss....what next??? mikeiscool (Aug 14)
- Re: xss....what next??? Dr HenDre (Aug 14)
- Re: xss....what next??? steven (Aug 14)
- Re: xss....what next??? Dr David Scholefield (Aug 15)
- <Possible follow-ups>
- RE: xss....what next??? Richard Braganza (Aug 15)