0

I am practicing reflected xss .I found a page in my lab which gives back the input in response of the request.But the application is sanitizing anything which comes after a < character because of which I can't use any tags.What is actually happening is when I give input as < it is being encoded and then sent to server , then server is decoding and checking for < character . If I use > character in addition to < character then every thing in between them is getting sanitized. Is there a way to bypass it?

wandrer
  • 1
  • 1

0 Answers0