diff --git a/README.md b/README.md index 0ff0c34..f58c564 100644 --- a/README.md +++ b/README.md @@ -16,7 +16,7 @@ The tool is not yet fully completed as I'm still adding some validations and fea The repo contains ready-to-use payloads that can bypass CSP for Facebook.com, Google.com and more. -**Bypasing Facebook.com Content-Security policy:** +**Bypassing Facebook.com Content-Security policy:** Facebook.com allows *.google.com in its CSP policy (script-src directive), thus, below payload would work like a charm to execute JavaScript on Facebook.com: `">` @@ -24,4 +24,4 @@ Facebook.com allows *.google.com in its CSP policy (script-src directive), thus, If you came across a website that trusts any of the domains in jsonp.txt file in its script-src directive, then pickup a payload that matches the domain and have fun :) # How can you help? -You are all welcome to contribute by adding links to sites that uses JSONP endpoins/callbacks to make the repo bigger and more usefull for bug hunters, pentesters, and security researchers. +You are all welcome to contribute by adding links to sites that uses JSONP endpoints/callbacks to make the repo bigger and more useful for bug hunters, pentesters, and security researchers. diff --git a/csp_lab.php b/csp_lab.php index 8299c5e..cc8c2fb 100644 --- a/csp_lab.php +++ b/csp_lab.php @@ -1,19 +1,19 @@ Hello Mr.".$xss;