47 lines
1.2 KiB
Markdown
47 lines
1.2 KiB
Markdown
![img](assets/banner.png)
|
|
|
|
<img src='assets/htb.png' style='zoom: 40%;' align=left /> <font size='4'>Phantom Script</font>
|
|
|
|
20<sup>th</sup> Oct 2024
|
|
Prepared By: Xclow3n
|
|
|
|
Challenge Author: Xclow3n
|
|
|
|
Difficulty: <font color=green>Very Easy</font>
|
|
|
|
Classification: Official
|
|
|
|
|
|
|
|
# [Synopsis](#synopsis)
|
|
|
|
- Phantom Script is a very easy web challenge where players can learn about Cross Site Scripting interactively.
|
|
|
|
## Skills Required
|
|
|
|
- Basic understanding of HTML/CSS/JS.
|
|
|
|
## Skills Learned
|
|
|
|
- Cross-Site Scripting (XSS)
|
|
|
|
# [Solution](#Solution)
|
|
|
|
Visiting the web page brings up the following display:
|
|
![img](assets/home.png)
|
|
|
|
We can see three sections: the web app, the Vulnerable Code window, and the Documentation.
|
|
|
|
![img](assets/search.png)
|
|
|
|
Performing a search updates both the article content and the Vulnerable Code window, showing where our input is processed in the vulnerable code.
|
|
|
|
According to the documentation, our goal is to trigger an alert box to receive the flag.
|
|
|
|
Entering the following payload: `<img src=x onerror="alert(1)" />`
|
|
|
|
Triggers an alert box, and after a short wait, we receive the flag.
|
|
|
|
![img](assets/flag.png)
|
|
|
|
This completes the challenge! :)
|