Informational |
User Agent Fuzzer |
Description |
Check for differences in response based on fuzzed User Agent (eg. mobile sites, access as a Search Engine Crawler). Compares the response statuscode and the hashcode of the response body with the original response.
|
|
URL |
http://testhtml5.vulnweb.com |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 267 bytes.
|
GET http://testhtml5.vulnweb.com HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:05 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 272 bytes.
|
GET http://testhtml5.vulnweb.com HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:05 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/ |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 479 bytes.
|
GET http://testhtml5.vulnweb.com/ HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://testhtml5.vulnweb.com/
Connection: keep-alive
Cookie: username=adminuUeYtBMy
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/ |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 484 bytes.
|
GET http://testhtml5.vulnweb.com/ HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://testhtml5.vulnweb.com/
Connection: keep-alive
Cookie: username=adminuUeYtBMy
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 399 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:07 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 399 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:07 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 399 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 411 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:07 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 477 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:07 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 464 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:09 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 427 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:09 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 421 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:07 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 432 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:08 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 485 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:08 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 490 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:08 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/logout |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 395 bytes.
|
GET http://testhtml5.vulnweb.com/logout HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://testhtml5.vulnweb.com/
Cookie: username=adminKcvIItkE
Upgrade-Insecure-Requests: 1
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:08 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6925
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,925 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
Welcome <b>adminKcvIItkE</b> | <a href='/logout'>Logout</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:10 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:10 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:10 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 243 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:10 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 309 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:11 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 296 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:12 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 259 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:12 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 253 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:11 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 264 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:11 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 317 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:12 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 322 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:12 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 227 bytes.
|
GET http://testhtml5.vulnweb.com/static/app HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:11 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 243 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:13 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 243 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:12 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 243 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:12 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 255 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:13 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 321 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:13 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 308 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 271 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 265 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:13 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 276 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 329 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 334 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/controllers |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 239 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/controllers HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:13 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 236 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 236 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 236 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:14 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 248 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:15 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 314 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:15 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 301 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:16 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 264 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:16 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 258 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:15 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 269 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:15 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 322 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:16 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 327 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:16 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/libs |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 232 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/libs HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:15 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 240 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:17 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 240 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:17 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 240 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:17 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 252 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:17 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 318 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:18 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 305 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:19 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 268 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:19 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 262 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:18 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 273 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:18 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 326 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:19 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 331 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:19 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/app/services |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 236 bytes.
|
GET http://testhtml5.vulnweb.com/static/app/services HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:18 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:20 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:20 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:19 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 243 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:20 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 309 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:20 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 296 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:22 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 259 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:22 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 253 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:20 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 264 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 317 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 322 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/css |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 227 bytes.
|
GET http://testhtml5.vulnweb.com/static/css HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 231 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 243 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:21 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 309 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:22 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 296 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:23 GMT
Content-Type: text/html
Content-Length: 555
Connection: keep-alive
|
Response Body
- size: 555 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
<!-- a padding to disable MSIE and Chrome friendly error page -->
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 259 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:23 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 253 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:22 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 264 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:22 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 317 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:23 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 322 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:23 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/static/img |
Method |
GET |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 227 bytes.
|
GET http://testhtml5.vulnweb.com/static/img HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Referer: http://testhtml5.vulnweb.com
|
Request Body
- size: 0 bytes.
|
|
Response Header
- size: 155 bytes.
|
HTTP/1.1 403 Forbidden
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:22 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
Response Body
- size: 153 bytes.
|
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence |
|
|
|
Request Header
- size: 296 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:04 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence |
|
|
|
Request Header
- size: 296 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:04 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence |
|
|
|
Request Header
- size: 296 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:04 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko |
Evidence |
|
|
|
Request Header
- size: 308 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Trident/7.0; rv:11.0) like Gecko
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:05 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0 |
Evidence |
|
|
|
Request Header
- size: 374 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3739.0 Safari/537.36 Edg/75.0.109.0
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:05 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 |
Evidence |
|
|
|
Request Header
- size: 361 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0 |
Evidence |
|
|
|
Request Header
- size: 324 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/91.0
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence |
|
|
|
Request Header
- size: 318 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:05 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence |
|
|
|
Request Header
- size: 329 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4 |
Evidence |
|
|
|
Request Header
- size: 382 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12A366 Safari/600.1.4
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence |
|
|
|
Request Header
- size: 387 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:06 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2924
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 2,924 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
</head>
<body>
<div style="padding-top: 10px; padding-bottom: 10px;">
<center>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a><br>
<a href="#/popular">Popular</a> | <a href="#/latest">Latest</a> | <a href="#/archive">Archive</a> | <a href="#/about">About</a><br>
</center>
</div>
<div class="container-fluid">
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
</body>
</html>
|
URL |
http://testhtml5.vulnweb.com/login |
Method |
POST |
Parameter |
Header User-Agent |
Attack |
msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence |
|
|
|
Request Header
- size: 292 bytes.
|
POST http://testhtml5.vulnweb.com/login HTTP/1.1
Host: testhtml5.vulnweb.com
user-agent: msnbot/1.1 (+http://search.msn.com/msnbot.htm)
Pragma: no-cache
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Referer: http://testhtml5.vulnweb.com
Content-Length: 27
|
Request Body
- size: 27 bytes.
|
username=admin&password=ZAP
|
Response Header
- size: 196 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:11:05 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 6940
Connection: keep-alive
Access-Control-Allow-Origin: *
|
Response Body
- size: 6,940 bytes.
|
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/html" data-ng-app="itemsApp">
<head>
<meta charset="utf-8">
<title>SecurityTweets - HTML5 test website for Acunetix Web Vulnerability Scanner</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<!-- Le styles -->
<link href="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/css/bootstrap-combined.min.css" rel="stylesheet">
<link href='http://fonts.googleapis.com/css?family=Lora:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
<link href="/static/css/style.css" rel="stylesheet">
<link rel="icon" type="image/png" href="http://www.acunetix.com/favicon.ico">
<style type="text/css">
body {
padding-top: 60px;
padding-bottom: 40px;
}
.sidebar-nav {
padding: 9px 0;
}
@media (max-width: 980px) {
/* Enable use of floated navbar text */
.navbar-text.pull-right {
float: none;
padding-left: 5px;
padding-right: 5px;
}
}
</style>
</head>
<body>
<div class="navbar navbar-fixed-top">
<div class="navbar-inner">
<div class="container-fluid">
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="brand" href="https://www.acunetix.com/"><img src="/static/img/logo2.png" alt="Acunetix website security"> </a>
<p class="navbar-text pull-left">
Vulnerable HTML5 test website for <a href="https://www.acunetix.com/vulnerability-scanner/">Acunetix Web Vulnerability Scanner</a>.
</p>
<p class="navbar-text pull-right">
<a href="#myModal" role="button" class="btn" data-toggle="modal">Login</a>
</p>
</div>
</div>
</div>
<div class="container-fluid">
<div class="row-fluid">
<div class="span2">
<div class="well sidebar-nav">
<ul class="nav nav-list">
<li class="nav-header">Views</li>
<li id="popularLi" class="active"><a href="#/popular">Popular</a></li>
<li><a href="#/latest">Latest</a></li>
<li><a href="#/carousel">Carousel</a></li>
<li><a href="#/archive">Archive</a></li>
<li class="nav-header">Website</li>
<li><a href="#/about">About</a></li>
<li><a href="#/contact">Contact</a></li>
<li class="nav-header">Acunetix</li>
<li><a target="_blank" href="http://www.acunetix.com/">Website</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/html5-website-security/">HTML5 scanner</a></li>
<li><a target="_blank" href="http://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/">HTML5 vuln help</a></li>
<li><a target="_blank" href="http://www.acunetix.com/blog/">Blog</a></li>
<li><a target="_blank" href="http://www.facebook.com/Acunetix">Facebook</a></li>
<li><a target="_blank" href="http://www.twitter.com/acunetix/">Twitter</a></li>
</ul>
</div><!--/.well -->
</div><!--/span-->
<div class="span10">
<div class="row-fluid">
<div ng-view></div>
</div><!--/row-->
</div><!--/span-->
</div><!--/row-->
<hr>
<div class="row-fluid">
<div class="pull-left" style="font-size: xx-small;" id="refId"></div>
</div>
<div style="background-color:lightgray;width:100%;text-align:center;font-size:14px">
<p style="padding-left:20%;padding-right:20%"><b>Warning</b>: This is an HTML5 application that is vulnerable by design. This is not a real collection of tweets. This application was created so that you can test your Acunetix, other tools, or your manual penetration testing skills. The application code is prone to attacks such as Cross-site Scripting (XSS) and XML External Entity (XXE). Links presented on this site have no affiliation to the site and are here only as samples.</p>
</div>
<footer>
<p class="pull-left">© Acunetix Ltd. 2019</p>
</footer>
</div><!--/.fluid-container-->
<!-- Modal -->
<div id="myModal" class="modal hide fade" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<form class="modal-body" action="/login" method="POST" id="loginForm">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-hidden="true">×</button>
<h3 id="myModalLabel">Login</h3>
</div>
<div class="modal-body">
<div class="control-group">
<!-- Username -->
<label class="control-label" for="username">Username</label>
<div class="controls">
<input type="text" id="username" name="username" placeholder="" class="input-xlarge" value="admin">
</div>
</div>
<div class="control-group">
<!-- Password-->
<label class="control-label" for="password">Password</label>
<div class="controls">
<input type="password" id="password" name="password" placeholder="" class="input-xlarge">
</div>
</div>
<div class="control-group">
<a href="#" class="btn" id="loginFormForgot">Forgot Pwd?</a>
</div>
</div>
<div class="modal-footer">
<button class="btn btn-primary" id="loginFormSubmit">Login</button>
<button class="btn" data-dismiss="modal" aria-hidden="true">Close</button>
</div>
</form>
</div>
<!-- Le javascript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
<script src="http://code.jquery.com/jquery-1.9.1.min.js"></script>
<script src="http://netdna.bootstrapcdn.com/twitter-bootstrap/2.3.1/js/bootstrap.min.js"></script>
<script src="https://ajax.googleapis.com/ajax/libs/angularjs/1.0.6/angular.min.js"></script>
<!-- App libs -->
<script src="/static/app/app.js"></script>
<script src="/static/app/libs/sessvars.js"></script>
<script src="/static/app/post.js"></script>
<script src="/static/app/controllers/controllers.js"></script>
<script src="/static/app/services/itemsService.js"></script>
<script src="http://bxss.s3.amazonaws.com/ad.js"></script>
</body>
</html>
|
Instances |
100 |
Solution |
|
Reference |
https://owasp.org/wstg
|
Tags |
|
CWE Id |
|
WASC Id |
|
Plugin Id |
10104 |