####Injection
-
Injection could be anything, It could be Sql, LADAP , XAPth, Mail Based injection or any other database.
-
Malicious request to modified query is an injection
-
Data exfiltration
-
Defences:
| * { outline: 2px dotted red } | |
| * * { outline: 2px dotted green } | |
| * * * { outline: 2px dotted orange } | |
| * * * * { outline: 2px dotted blue } | |
| * * * * * { outline: 1px solid red } | |
| * * * * * * { outline: 1px solid green } | |
| * * * * * * * { outline: 1px solid orange } | |
| * * * * * * * * { outline: 1px solid blue } |
| netsh wlan set hostednetwork mode=allow ssid=Paladion-Hotspot key=paladion123! | |
| netsh wlan start hostednetwork |
####Injection
Injection could be anything, It could be Sql, LADAP , XAPth, Mail Based injection or any other database.
Malicious request to modified query is an injection
Data exfiltration
Defences:
| /* Open Inspect element or scratchpad and run the command below...*/ | |
| links = document.links; | |
| for (i = 0; i < (links.length); i++) { | |
| console.log(links[i].href); | |
| } |
| #! /usr/bin/python | |
| #Author == @avicoder | |
| import sys,getopt | |
| r = '\033[31m' #red | |
| b = '\033[34m' #blue | |
| g = '\033[32m' #green | |
| y = '\033[33m' #yellow |
| _CONST SEGMENT ; or _DATA | |
| $SG1234 DB 'Hello, World',0AH,00H | |
| _CONST ENDS | |
| _TEXT SEGMENT | |
| push ebp | |
| move ebp,esp | |
| push OFFSET $SG1234 | |
| call _printf | |
| add ebp,4 |
| <script type="text/javascript"> | |
| var enforce = "avicoder.me"; | |
| if ((enforce == window.location.host) && (window.location.protocol != "https:")) | |
| window.location = window.location.toString().replace(/^http:/, "https:"); | |
| </script> |
I hereby claim:
To claim this, I am signing this object:
| Fix, gdb shared lib | |
| Try compiling using gcc -fno-builtin. | |
| gdb: “No symbol table is loaded” | |
| gcc -g prog.c |
Challenge 0
"><svg onload=prommpt(1)>
Challenge 1
<img src=1 onerror=prompt(1)/
Challenge 2