Exploitation: Difference between revisions
Jump to navigation
Jump to search
m (→Metasploit) |
|||
Line 14: | Line 14: | ||
* Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423 | * Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423 | ||
* https://github.com/r0oth3x49/ghauri | * https://github.com/r0oth3x49/ghauri | ||
* SQL Injection & XSS Playground: https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#classic-sql-injection | |||
=== Cross-site scripting (XSS) === | === Cross-site scripting (XSS) === |
Revision as of 23:59, 29 July 2023
Payloads
Metasploit
- Install on server: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html
Public exploits
SQL injection (SQLi)
- https://github.com/sqlmapproject/sqlmap
- Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423
- https://github.com/r0oth3x49/ghauri
- SQL Injection & XSS Playground: https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#classic-sql-injection