<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>SpellBook</title>
    <link>https://ag2s.ca/spellbook/2.-web-pentesting/</link>
    <description>Recent content on SpellBook</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="https://ag2s.ca/spellbook/2.-web-pentesting/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title></title>
      <link>https://ag2s.ca/spellbook/2.-web-pentesting/misc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://ag2s.ca/spellbook/2.-web-pentesting/misc/</guid>
      <description>&lt;h2 id=&#34;https-exfiltration-server&#34;&gt;HTTPS Exfiltration Server&lt;a class=&#34;anchor&#34; href=&#34;#https-exfiltration-server&#34;&gt;#&lt;/a&gt;&lt;/h2&gt;&#xA;&lt;h3 id=&#34;real-environment&#34;&gt;Real environment&lt;a class=&#34;anchor&#34; href=&#34;#real-environment&#34;&gt;#&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Use &lt;a href=&#34;https://app.interactsh.com&#34;&gt;interact.sh&lt;/a&gt;. This is the cheapest (free) one for POC. Otherwise, setup your own exfiltration server on cloud, or on prem if you&amp;rsquo;re nuts&lt;/p&gt;&#xA;&lt;h3 id=&#34;lab-ctf&#34;&gt;Lab, CTF&lt;a class=&#34;anchor&#34; href=&#34;#lab-ctf&#34;&gt;#&lt;/a&gt;&lt;/h3&gt;&#xA;&lt;p&gt;Create a certificate. Outside of lab environment, better set this up with &lt;code&gt;Nginx&lt;/code&gt; or &lt;code&gt;Apache2&lt;/code&gt; and request cert from letsencrypt&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-sh&#34; data-lang=&#34;sh&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;openssl req -new -x509 -keyout server.pem -out server.pem -days &lt;span style=&#34;color:#ae81ff&#34;&gt;365&lt;/span&gt; -nodes&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;For payloads in &lt;a href=&#34;https://ag2s.ca/spellbook/2.-web-pentesting/2.2-common-attacks/xss---cross-site-scripting/&#34;&gt;XSS - Cross Site Scripting&lt;/a&gt;. This simple server will &lt;code&gt;base64&lt;/code&gt; decode &lt;code&gt;data&lt;/code&gt; key in json string like &lt;code&gt;{&amp;quot;data&amp;quot;: &amp;quot;b64-string&amp;quot;}&lt;/code&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
