cybNg.com

Mutillidae DOM Data

Previous Next

DOM(Document Object Model) client side normal attack


Why is DOM attack

DOM attack are use normally to inject the HTML tag attack , for example we have a comment box and we write some text with the html tags like : <b> ,<u> ,<del> etc.

💡 We can also use the javaScript code to inject the page

Example Security label : 0

Do you know? why we use here sql-injection method to extract the data. Because the data display using the server scripting language by Sql fetch method.

  1. Open HTML 5 Web Storage page
  2. Just fill the input box as <h1>Your Text</h1>

Now click Add New , You can see the Tag are cross the html and exicute


Security label : 1

  1. Just fill the first input box as

    <select><option>Varanasi</option><option>Banglore</option></select>

  2. fill the second input box as Choose city

After click the Add New button , You can see this option box

💡 Tip : You can add the any HTML tag element


Previous Next
cybNg Designed for learning, testing and training. Examples are simplified to improve reading and basic understanding, tutorials and examples are constantly reviewed to avoid over-comprehension and errors, but we cannot warrant the complete accuracy of all content. While using this site, you agree to read and accept our use, cookie and privacy policy. All the information given in it is made for education purpose only, there will be no responsibility of this website or this organization for misuse of the information given in it. We hope that all the information provided in it is good for our students. So that it helps improve the cyber world.