Finding the Owasp cheat sheet is a good thing but the most important part is understanding what each payload does and how do we expect the browser to react.
Here the challenge asks us to execute exactly this code:
So we don’t need a huge XSS payload, we just want the server to execute this piece of code. So try to execute it and bypass the filter :)
I already saw that the filter filters out when i replace the brackets with asciii it shows me the complete string but it does not execute.. could you give me a hint for where to look for?
As @DIDIx13 says, you have to stick to the challenge. At this time, no need to dig so deep, even if Owasp is a good reading :)
Maybe you could first think about how the filter does the job, then only in a second time find how to bypass it.
I know it filters out the tags. and i see that it doesn’t recognize the script because it’s in the textarea. i already tried to step out of it by using but without succes.
I think you should try to understand what the filter does exactly to what you send. Then you should be able to guess how to bypass it easily. I hope it will help you ^^