Cross-site Scripting | Tryhackme Walkthrough
Tags
attack-pattern: | Data Model Javascript - T1059.007 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Vulnerabilities - T1588.006 Scripting - T1064 Scripting |
Common Information
Type | Value |
---|---|
UUID | c2dce449-3a95-4adf-a1f6-93853f5dc1c7 |
Fingerprint | 2c8399192daf27b1 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | July 26, 2023, 9:41 a.m. |
Added to db | July 26, 2023, 11:59 a.m. |
Last updated | Nov. 17, 2024, 8:43 p.m. |
Headline | Cross-site Scripting | Tryhackme Walkthrough |
Title | Cross-site Scripting | Tryhackme Walkthrough |
Detected Hints/Tags/Attributes | 53/1/13 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 12 | w3.org |
|
Details | Domain | 13 | thmlabs.com |
|
Details | Domain | 10 | www.base64decode.org |
|
Details | Domain | 303 | tryhackme.com |
|
Details | 2 | attacker@hacker.thm |
||
Details | File | 8 | e.key |
|
Details | File | 7 | cat.jpg |
|
Details | md5 | 1 | 4AB305E55955197693F01D6F8FD2D321 |
|
Details | Url | 2 | https://hacker.thm/steal?cookie= |
|
Details | Url | 2 | https://hacker.thm/log?key= |
|
Details | Url | 4 | https://lab_web_url.p.thmlabs.com |
|
Details | Url | 10 | https://www.base64decode.org |
|
Details | Url | 1 | https://tryhackme.com/room/xss |