Reflected

This is XSS where the attack is local to the client side but the xss request is reflected off of the server and the link generates the activity only for the target users browser only. But Reflected XSS can be used to then send or store data to another location by requesting this activity of the browser in the reflected payload.

Common places to try:

  • GET/POST variables

  • Cookie variables

  • HTTP Headers

  • Web App user input channels

Look for input to be displayed on site somewhere then input HTML tags <h1> and <plaintext> are good to start with. H1 will make a bold looking header font and plaintext left open will break the rest of the site to appear as plaintext. Then also try JS to see if either of them make it to the output.

Example Vulnerable Code:

<?php $name = @$_GET['name']; ?>
Welcome <?=$name?>

For reflected attacks you will likely be crafting a URL to send to another user. In that case their own client view within the browser is being exploited and you have access to everything they do. A reverse shell can be a good choice here. Check XXS for the rshell sample.

Last updated

Was this helpful?