home
about
FaceBook
Facebook Tutorials & Tips
FaceBook Scripts - Facebook Extensions
Paid Facebook Scripts
Social Media
Social Applications
Social Extensions
Tech & SocialMedia
IT Highlights
CVE & Disclosures
Awareness and Security
Websites Development
Websites Security
Khalil
contact
report a bug
Terms of Use
Privacy Policy
C&M
Videos
Latest Tech
How to Create AI-Generated 360-Degree Photos for Facebook
My Experience Receiving $51 from Facebook’s Privacy Settlement via PayPal
Lavender AI How Israel Uses Artificial Intelligence to Target Humans in Gaza
YouTube's policy for monetizing AI videos
40 Meta Quest Tips and Tricks for Beginners and Professionals
Watchin’ a Flick on Your iPhone Through a Meta Quest with a USB-C Cable: Does It Work
Exploring netstat: My Guide to Network Connections and Security
Discovering traceroute: Your Journey Through Network Paths
What is nslookup and how to use it ?
What is PING command and how to use it - Ping security and tips
Latest Posts
Facebook Account Security
Securing the Modern Web: An In-Depth Look at the Chrome DevTools Security Panel
Return-Oriented Programming: Understanding the Attack to Master the Defense
SQL Injection, Defensive Strategies & OWASP Guidelines
Network Security Bible: A Comprehensive Cybersecurity Awareness and Research Guide
Network and System Security: A Comprehensive Cybersecurity Awareness and Research Guide
Understanding Error-Based SQL Injection in ASP/ASPX Applications: A Security Awareness Guide
XSS Protection for Developers: A Complete Guide to Securing Web Applications
HTML5 Modern Day Attack and Defence Vectors
How to Secure a PHP Data Endpoint Called via Ajax
Hacking to Windows 7 fully patched client using Xssf and Metasploit with injected JavaScript and java applet ,tunneling traffic to hijack user session
Details
Written by:
khalil shreateh
Category:
Websites Security
Hits: 8840
linux
attacker can use persistent xss , and for non persistent xss attacker can use shorten url ,
but that need to stick the victim in a website for a while .
*this tutorial is limited *
*tutorial by : noizepulse *
Post
by
Khalil - خليل
.
Previous article: What is URL redirection vulnerability !
Prev
Next article: Video :: Hackers World - Anonymous
Next
How to Create AI-Generated 360-Degree Photos for Facebook
My Experience Receiving $51 from Facebook’s Privacy Settlement via PayPal
Lavender AI How Israel Uses Artificial Intelligence to Target Humans in Gaza
YouTube's policy for monetizing AI videos
40 Meta Quest Tips and Tricks for Beginners and Professionals
Information Security
Facebook Account Security
Securing the Modern Web: An In-Depth Look at the Chrome DevTools Security Panel
Return-Oriented Programming: Understanding the Attack to Master the Defense
SQL Injection, Defensive Strategies & OWASP Guidelines
Network Security Bible: A Comprehensive Cybersecurity Awareness and Research Guide
Network and System Security: A Comprehensive Cybersecurity Awareness and Research Guide
Understanding Error-Based SQL Injection in ASP/ASPX Applications: A Security Awareness Guide
XSS Protection for Developers: A Complete Guide to Securing Web Applications
HTML5 Modern Day Attack and Defence Vectors
How to Secure a PHP Data Endpoint Called via Ajax
Social Media Share
About
Contact
Terms of Use
Privacy Policy
©
Khalil Shreateh
— Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.