I would try: site="http://www.bput.org/" payloads="<script>alert('xss')</script>" attack= urllib2.urlopen(site+payloads,80).readlines()
-Alex Goretoy http://www.alexgoretoy.com somebodywhoca...@gmail.com On Sun, Jan 11, 2009 at 2:49 AM, Steve Holden <st...@holdenweb.com> wrote: > Paul Rubin wrote: > > asit <lipu...@gmail.com> writes: > >> site="www.bput.org" > >> payloads="<script>alert('xss')</script>" > >> attack= urllib2.urlopen(site+payloads,80).readlines() > >> > >> according to my best knowledge, the above code is correct. > >> but why it throws exceptio ???? > > > > The code is incorrect. Look at the string ou are sending into > > urlopen. What on earth are you trying to do? > > He's investigating potential cross-site scripting vulnerabilities. > > regards > Steve > -- > Steve Holden +1 571 484 6266 +1 800 494 3119 > Holden Web LLC http://www.holdenweb.com/ > > -- > http://mail.python.org/mailman/listinfo/python-list >
-- http://mail.python.org/mailman/listinfo/python-list