####Injection
-
Injection could be anything, It could be Sql, LADAP , XAPth, Mail Based injection or any other database.
-
Malicious request to modified query is an injection
-
Data exfiltration
-
Defences:
* { outline: 2px dotted red } | |
* * { outline: 2px dotted green } | |
* * * { outline: 2px dotted orange } | |
* * * * { outline: 2px dotted blue } | |
* * * * * { outline: 1px solid red } | |
* * * * * * { outline: 1px solid green } | |
* * * * * * * { outline: 1px solid orange } | |
* * * * * * * * { outline: 1px solid blue } |
netsh wlan set hostednetwork mode=allow ssid=Paladion-Hotspot key=paladion123! | |
netsh wlan start hostednetwork |
####Injection
Injection could be anything, It could be Sql, LADAP , XAPth, Mail Based injection or any other database.
Malicious request to modified query is an injection
Data exfiltration
Defences:
/* Open Inspect element or scratchpad and run the command below...*/ | |
links = document.links; | |
for (i = 0; i < (links.length); i++) { | |
console.log(links[i].href); | |
} |
#! /usr/bin/python | |
#Author == @avicoder | |
import sys,getopt | |
r = '\033[31m' #red | |
b = '\033[34m' #blue | |
g = '\033[32m' #green | |
y = '\033[33m' #yellow |
_CONST SEGMENT ; or _DATA | |
$SG1234 DB 'Hello, World',0AH,00H | |
_CONST ENDS | |
_TEXT SEGMENT | |
push ebp | |
move ebp,esp | |
push OFFSET $SG1234 | |
call _printf | |
add ebp,4 |
<script type="text/javascript"> | |
var enforce = "avicoder.me"; | |
if ((enforce == window.location.host) && (window.location.protocol != "https:")) | |
window.location = window.location.toString().replace(/^http:/, "https:"); | |
</script> |
I hereby claim:
To claim this, I am signing this object:
Fix, gdb shared lib | |
Try compiling using gcc -fno-builtin. | |
gdb: “No symbol table is loaded” | |
gcc -g prog.c |
Challenge 0
"><svg onload=prommpt(1)>
Challenge 1
<img src=1 onerror=prompt(1)/
Challenge 2