WEB

a web of poor design decisions

XSS

  • xss challs /usually) either simply require a popped alert, or have a user(cronjob) that visits a website whose cookies should get stolen

  • '"<>;{}-=`#/* are all interesting chars. See if you can construct a javascript context with them in the dom

  • Consider CSP and CSP bypasses

SQLi

  • Try inserting ' and SLEEP payloads, basically every dbms can be injected.

  • dont rely too much on sqlmap

IDOR

  • try different values for parameters such as id=3 -> try 0,1,2,4,-1,100,10000,...

File Upload

  • Any File upload is suspicious, try changing mime, magic bytes, filename, content-type,... some combination might work

  • try uploading weird files for weird error messages

PHP

  • Php alone is a vulnerability ;) so many gotchas, read the reference for every function, be aware of types and strong/weak comparisons etc.

SSRF/LFI/RFI/XXE

  • many more possible vulnerability types that may be more or less streightforward to exploit

Last updated