Tag

reflected XSS

1 views collected around this technical thread.

360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 2, 2017 · Information Security

Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools

This article explains broken link hijacking, detailing stored and reflected attack vectors such as account spoofing, external JavaScript takeover, information leakage, and content hijacking, provides real‑world examples, and introduces practical tools like broken‑link‑checker and twitterBFTD for discovering vulnerable expired links.

broken link hijackinginformation securityreflected XSS
0 likes · 6 min read
Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools