Skip to content

Commit

Permalink
translate 1
Browse files Browse the repository at this point in the history
  • Loading branch information
carlospolop committed Jan 2, 2025
1 parent a32f0a4 commit 9b57a6a
Show file tree
Hide file tree
Showing 340 changed files with 341 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -756,3 +756,4 @@ Project Neto is a Python 3 package conceived to analyse and unravel hidden featu

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -100,3 +100,4 @@ browext-xss-example.md

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -112,3 +112,4 @@ However, tightening security measures often results in decreased flexibility and

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -117,3 +117,4 @@ Notably, the **`/html/bookmarks.html`** page is prone to framing, thus vulnerabl

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/cache-deception/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -256,3 +256,4 @@ Get Access Today:

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -144,3 +144,4 @@ Cache: hit

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -51,3 +51,4 @@ Several cache servers will always cache a response if it's identified as static.

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -862,3 +862,4 @@ Stay informed with the newest bug bounties launching and crucial platform update
{{#include ../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -65,3 +65,4 @@ window.frames[0].document.head.appendChild(script)

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -262,3 +262,4 @@ XS-Search are oriented to **exfiltrate cross-origin information** abusing **side
{{#include ../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/deserialization/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -978,3 +978,4 @@ Check for more details in the [**original post**](https://github.blog/security/v
{{#include ../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -196,3 +196,4 @@ namespace DeserializationTests

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -88,3 +88,4 @@ As you can see in this very basic example, the "vulnerability" here appears beca

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -4,3 +4,4 @@

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -221,3 +221,4 @@ Check for [further information here](<https://github.com/carlospolop/hacktricks/

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -200,3 +200,4 @@ Make your payload execute something like the following:

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -7,3 +7,4 @@ Check the posts:

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -230,3 +230,4 @@ You can find more gadgets here: [https://deadcode.me/blog/2016/09/02/Blind-Java-
{{#include ../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -461,3 +461,4 @@ In this [**writeup**](https://intrigus.org/research/2022/07/18/google-ctf-2022-l

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -393,3 +393,4 @@ To reduce the risk of prototype pollution, the strategies listed below can be em
{{#include ../../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -115,3 +115,4 @@ Check this writeup: [https://blog.huli.tw/2022/05/02/en/intigriti-revenge-challe

{{#include ../../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -126,3 +126,4 @@ You could definitely use it in a bug **chain** to exploit a **prototype pollutio

{{#include ../../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -729,3 +729,5 @@ In [**this commit**](https://github.com/nodejs/node/commit/0313102aaabb49f78156c
- [https://portswigger.net/research/server-side-prototype-pollution](https://portswigger.net/research/server-side-prototype-pollution)

{{#include ../../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -69,3 +69,4 @@ I needed to **call this deserialization twice**. In my testing, the first time t

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -156,3 +156,4 @@ cat /tmp/example_yaml

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/deserialization/ruby-class-pollution.md
Original file line number Diff line number Diff line change
Expand Up @@ -418,3 +418,4 @@ It's possible to brute-force the defined classes and at some point poison the cl

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/file-inclusion/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -735,3 +735,4 @@ Stay informed with the newest bug bounties launching and crucial platform update

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -42,3 +42,4 @@ For more information check the description of the Race Condition and the CTF in
{{#include ../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -100,3 +100,4 @@ It looks like by default Nginx supports **512 parallel connections** at the same

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -53,3 +53,4 @@ if **name** == "**main**": print('\[DEBUG] Creating requests session') requests\
```


Original file line number Diff line number Diff line change
Expand Up @@ -274,3 +274,4 @@ Deepen your expertise in **Mobile Security** with 8kSec Academy. Master iOS and

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/file-inclusion/lfi2rce-via-phpinfo.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,3 +72,4 @@ print('[x] Something went wrong, please try again')

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -63,3 +63,4 @@ if __name__ == "__main__":

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -33,3 +33,4 @@ For GNU/Linux systems, the randomness in temporary file naming is robust, render

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/file-inclusion/phar-deserialization.md
Original file line number Diff line number Diff line change
Expand Up @@ -83,3 +83,4 @@ php vuln.php

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -38,3 +38,4 @@ Another writeup in [https://spyclub.tech/2018/12/21/one-line-and-return-of-one-l

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/file-upload/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -338,3 +338,4 @@ If you are interested in **hacking career** and hack the unhackable - **we are h
{{#include ../../banners/hacktricks-training.md}}
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/hacking-with-cookies/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -299,3 +299,4 @@ There should be a pattern (with the size of a used block). So, knowing how are a

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/hacking-with-cookies/cookie-bomb.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,3 +8,4 @@ And for more information, you can check this presentation: [https://speakerdeck.

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -23,3 +23,4 @@ Notice, that third party cookies pointing to a different domain won't be overwri
{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/hacking-with-cookies/cookie-tossing.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,3 +66,4 @@ cookie-bomb.md

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/http-request-smuggling/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -775,3 +775,4 @@ def handleResponse(req, interesting):

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/ldap-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -231,3 +231,4 @@ If you are interested in **hacking career** and hack the unhackable - **we are h
{{#include ../banners/hacktricks-training.md}}
1 change: 1 addition & 0 deletions src/pentesting-web/login-bypass/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,3 +108,4 @@ Pages usually redirects users after login, check if you can alter that redirect

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/login-bypass/sql-login-bypass.md
Original file line number Diff line number Diff line change
Expand Up @@ -829,3 +829,4 @@ Pass1234." and 1=0 union select "admin",sha("Pass1234.")#

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/nosql-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -280,3 +280,4 @@ Get Access Today:
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=nosql-injection" %}
1 change: 1 addition & 0 deletions src/pentesting-web/oauth-to-account-takeover.md
Original file line number Diff line number Diff line change
Expand Up @@ -240,3 +240,4 @@ If the platform you are testing is an OAuth provider [**read this to test for po

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/open-redirect.md
Original file line number Diff line number Diff line change
Expand Up @@ -196,3 +196,4 @@ Deepen your expertise in **Mobile Security** with 8kSec Academy. Master iOS and

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/orm-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -332,3 +332,4 @@ By brute-forcing and potentially relationships it was possible to leak more data

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/parameter-pollution.md
Original file line number Diff line number Diff line change
Expand Up @@ -234,3 +234,4 @@ Which might create inconsistences

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/phone-number-injections.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,3 +18,4 @@ It's possible to **add strings at the end the phone number** that could be used

{{#include ../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -244,3 +244,4 @@ javascript:"/*'/*`/*--></noscript></title></textarea></style></template></noembe

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -44,3 +44,4 @@ javascript:"/*'/*`/*--></noscript></title></textarea></style></template></noembe

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/postmessage-vulnerabilities/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -238,3 +238,4 @@ For **more information**:

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -33,3 +33,4 @@ And in order to be precise and **send** that **postmessage** just **after** the

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -75,3 +75,4 @@ That **payload** will get the **identifier** and send a **XSS** it **back to the

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -85,3 +85,4 @@ The final solution by [**@terjanq**](https://twitter.com/terjanq) is the [**foll

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,4 @@ This is specially useful in **postMessages** because if a page is sending sensit

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/proxy-waf-protections-bypass.md
Original file line number Diff line number Diff line change
Expand Up @@ -233,3 +233,4 @@ data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+ #base64 encoding the javascri

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/race-condition.md
Original file line number Diff line number Diff line change
Expand Up @@ -411,3 +411,4 @@ Get Access Today:

{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=race-condition" %}


1 change: 1 addition & 0 deletions src/pentesting-web/rate-limit-bypass.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,3 +72,4 @@ Get Access Today:

{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=rate-limit-bypass" %}


1 change: 1 addition & 0 deletions src/pentesting-web/registration-vulnerabilities.md
Original file line number Diff line number Diff line change
Expand Up @@ -181,3 +181,4 @@ hacking-jwt-json-web-tokens.md

{{#include ../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -81,3 +81,4 @@ Regexp (a+)*$ took 723 milliseconds.

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/reset-password.md
Original file line number Diff line number Diff line change
Expand Up @@ -218,3 +218,4 @@ Stay informed with the newest bug bounties launching and crucial platform update

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/reverse-tab-nabbing.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,3 +82,4 @@ Prevention information are documented into the [HTML5 Cheat Sheet](https://cheat

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/saml-attacks/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -305,3 +305,4 @@ with open("/home/fady/uberSAMLOIDAUTH") as urlList:

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/saml-attacks/saml-basics.md
Original file line number Diff line number Diff line change
Expand Up @@ -166,3 +166,4 @@ In conclusion, XML Signatures provide flexible ways to secure XML documents, wit

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -245,3 +245,4 @@ xslt-server-side-injection-extensible-stylesheet-language-transformations.md

{{#include ../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/sql-injection/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -572,3 +572,4 @@ This trick was taken from [https://secgroup.github.io/2017/01/03/33c3ctf-writeup

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/sql-injection/cypher-injection-neo4j.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,3 +9,4 @@ Check the following blogs:

{{#include ../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -194,3 +194,4 @@ Where **name\[i] is a .mdb filename** and **realTable is an existent table** wit

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/sql-injection/mssql-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -271,3 +271,4 @@ exec('sp_configure''xp_cmdshell'',''1''reconfigure')--

{{#include ../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/sql-injection/mysql-injection/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -192,3 +192,4 @@ mysql> select version();

{{#include ../../../banners/hacktricks-training.md}}


Original file line number Diff line number Diff line change
Expand Up @@ -28,3 +28,4 @@ Automation of these processes can be facilitated by tools such as SQLMap, which

{{#include ../../../banners/hacktricks-training.md}}


1 change: 1 addition & 0 deletions src/pentesting-web/sql-injection/oracle-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -160,3 +160,4 @@ Another package I have used in the past with varied success is the [`GETCLOB()`

{{#include ../../banners/hacktricks-training.md}}


Loading

0 comments on commit 9b57a6a

Please sign in to comment.