Tracy
jacob.heath.ncc
(2 人评分) |655 位用户 | 来自
商店
|

概述
翻译

There are many different ways to trigger XSS, especially considering the large number of frontend frameworks that have been made popular in the last few years. For example, some of the less traditional ways of exploiting XSS can be through: * DOM clobbering * DOM injection * Frontend template injection * Backend template injection * Open redirects These attack vectors are significantly different than traditional stored and reflected XSS cases and they require new tools for finding them effectively. Many similar tools only look for server response reflection, however this is not very helpful if all output encoding is performed by the frontend. In order to really gain knowledge about all the true sinks of the application, we need a tool that grants us "X-ray vision into the DOM". This extensions was written with the goal of eliminating XSS by assisting a penetration tester in identifying every source of input into an application and following that input to all of its sinks. These cases are documented and stored as references that can be used to identify the locations of potentially risky input.

来自商店的评价 (0)

尚无人评价此扩展,查看 所有语言

留言

支持浏览器

适用于以下浏览器

其他信息

文件类型
crx
版本
0.9.2 已同步至最新
更新日期
2021年5月21日 1年前
大小
899KiB
语言
查看全部1种支持的语言
权限
所属类别
开发者