I get the concept of the exercise but when i poison the cache it keeps replacing <,> in my payload with the html code “& lt;” and “& gt;”
Idk how im suppose to bypass this and they don’t explain it in the lesson they just explain the cache poisoning but not how to bypass any character sanitization
If somebody can point me to the right direction i feel so dumb lol
Hey man, how did you bypass the character sanitization? I’m having the same problem, already tried to inject in every get request, but it keeps sanitazing…