Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

trying to make a spam bot in javascript

Name: Anonymous 2013-08-12 9:53

with ajax
and man, fuck same origin policy

Name: Anonymous 2013-08-12 10:55

JEWS

Name: Anonymous 2013-08-13 18:49

tried mixing some php in it
and got

throw 'allowScriptTagRemoting is false.';
//#DWR-REPLY
if (window.dwr) dwr.engine._remoteHandleBatchException({ name:'java.lang.SecurityException', message:'Session Error' });
else if (window.parent.dwr) window.parent.dwr.engine._remoteHandleBatchException({ name:'java.lang.SecurityException', message:'Session Error' });


wat do?

Name: Anonymous 2013-08-13 18:56

Javascript
Shalom!

Name: Anonymous 2013-08-15 6:17

Name: Anonymous 2013-08-15 7:46

>>5
You know that you can scrape motherless.com without any account, right?

Name: Anonymous 2013-08-15 9:58

now I'm trying some cross site scripting, because I accidentally found out this forum doesn't escape < and > in certain places
but this place is only 60 chars wide, and they "kinda" wised up and started replacing script with scr1pt, so I can't do <script src=.../>, and 60 chars is too few to do any relevant scripting
so I'm trying to send 3 Private Messages in a row (60*3 chars) (found out there's no delay between PMs, only between posts) with php
but then I found some problems with multi quotes and tried this
...
$values["pm.topic"]="<img src=h onerror=\"X=\\\"JSESSIONID=sdrgfv5m8ayr.ha1\\\"\"/>";
...
foreach ($values as $a => $b) {
echo "<input type='hidden' name='".htmlentities($a)."' value='".htmlentities($b)."'>";
}
and I get
<img src=h onerror="X=\"JSESSIONID=sdrgfv5m8ayr.ha1\""/>
can't seem to escape quotes in html
wat do?

Name: Anonymous 2013-08-15 11:55

Name: Anonymous 2013-08-16 9:56

it works on firefox but not on chrome
I want it to work on both browsers before I initiate the attack

The XSS Auditor refused to execute a script in 'http://thesitesurl' because its source code was found within the request. The auditor was enabled as the server sent neither an 'X-XSS-Protection' nor 'Content-Security-Policy' header.

Name: Anonymous 2013-08-16 16:46

ok I found an alternate way and attacked the forum, sending PMs that make the user create a thread with unproper pictures, to all users in the front page
it went on for an hour and then they blocked the PMs, it's gonna stay blocked until they fix the xss vulnerability
well, at least I had fun
someone mentioned I should've stolen their cookies instead, but I dunno much about that

Name: Anonymous 2013-08-16 23:08

my goodness!

Name: Anonymous 2013-08-16 23:25

>>11
Nice dubs, bro!

Name: Anonymous 2013-08-16 23:26

>>12
Thank you!

Don't change these.
Name: Email:
Entire Thread Thread List