From 450de2c90f52c3dda85730773652f52b779c3b67 Mon Sep 17 00:00:00 2001 From: Swissky Date: Mon, 4 Mar 2019 19:40:34 +0100 Subject: [PATCH] Typo fix --- Methodology and Resources/Windows - Privilege Escalation.md | 4 ++-- Server Side Request Forgery/README.md | 1 + XSS injection/README.md | 2 +- 3 files changed, 4 insertions(+), 3 deletions(-) diff --git a/Methodology and Resources/Windows - Privilege Escalation.md b/Methodology and Resources/Windows - Privilege Escalation.md index 682cd80..05f2d34 100644 --- a/Methodology and Resources/Windows - Privilege Escalation.md +++ b/Methodology and Resources/Windows - Privilege Escalation.md @@ -12,7 +12,7 @@ * [EoP - Windows Subsystem for Linux (WSL)](#eop---windows-subsystem-for-linux-wsl) * [EoP - Unquoted Service Paths](#eop---unquoted-service-paths) * [EoP - Kernel Exploitation](#eop---kernel-exploitation) -* [EOP - AlwaysInstallElevated](#eop---alwaysinstallelevated) +* [EoP - AlwaysInstallElevated](#eop---alwaysinstallelevated) * [EoP - Insecure GUI apps](#eop---insecure-gui-apps) * [EoP - Runas](#eop---runas) @@ -499,7 +499,7 @@ List of exploits kernel : [https://github.com/SecWiki/windows-kernel-exploits](h ... - [MS03-026](./MS03-026)  [KB823980]   [Buffer Overrun In RPC Interface]  (/NT/2000/XP/2003) -## EOP - AlwaysInstallElevated +## EoP - AlwaysInstallElevated Check if these registry values are set to "1". diff --git a/Server Side Request Forgery/README.md b/Server Side Request Forgery/README.md index d79c061..fee1559 100644 --- a/Server Side Request Forgery/README.md +++ b/Server Side Request Forgery/README.md @@ -96,6 +96,7 @@ Bypass localhost with a domain redirecting to locahost http://localtest.me http://customer1.app.localhost.my.company.127.0.0.1.nip.io http://mail.ebc.apple.com redirect to 127.0.0.6 == localhost +http://bugbounty.dod.network redirect to 127.0.0.2 == localhost ``` The service nip.io is awesome for that, it will convert any ip address as a dns. diff --git a/XSS injection/README.md b/XSS injection/README.md index c257558..e0750f0 100644 --- a/XSS injection/README.md +++ b/XSS injection/README.md @@ -11,7 +11,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall - [Polyglot XSS](#polyglot-xss) - [Filter Bypass and Exotic payloads](#filter-bypass-and-exotic-payloads) - [CSP Bypass](#csp-bypass) -- [Common WAF Bypas](#common-waf-bypass) +- [Common WAF Bypass](#common-waf-bypass) ## Exploit code or POC