I am practicing reflected xss .I found a page in my lab which gives back the input in response of the request.But the application is sanitizing anything which comes after a < character because of which I can't use any tags.What is actually happening is when I give input as < it is being encoded and then sent to server , then server is decoding and checking for < character . If I use > character in addition to < character then every thing in between them is getting sanitized. Is there a way to bypass it?
Asked
Active
Viewed 24 times
<foo<bar>>. – Arminius Apr 25 '20 at 06:51