From 66c9d945b74ea07ae4419e8743e30156f148c067 Mon Sep 17 00:00:00 2001 From: Alexandre ZANNI <16578570+noraj@users.noreply.github.com> Date: Tue, 6 Aug 2019 17:28:47 +0200 Subject: [PATCH] Update README.md --- XXE Injection/README.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/XXE Injection/README.md b/XXE Injection/README.md index f94edd0..f3a3faf 100644 --- a/XXE Injection/README.md +++ b/XXE Injection/README.md @@ -32,6 +32,11 @@ Syntax: `` ``` sudo ./xxeftp -uno 443 ./xxeftp -w -wps 5555 ``` + - [230-OOB](https://github.com/lc/230-OOB) and payload generation via [http://xxe.sh/](http://xxe.sh/) + ``` + $ python3 230.py 2121 + ``` + ## Detect the vulnerability @@ -306,4 +311,4 @@ GIF (experimental) * [XXE in Uber to read local files](https://httpsonly.blogspot.hk/2017/01/0day-writeup-xxe-in-ubercom.html) * [XXE by SVG in community.lithium.com](http://esoln.net/Research/2017/03/30/xxe-in-lithium-community-platform/) * [XXE inside SVG](https://quanyang.github.io/x-ctf-finals-2016-john-slick-web-25/) -* [Pentest XXE - @phonexicum](https://phonexicum.github.io/infosec/xxe.html) \ No newline at end of file +* [Pentest XXE - @phonexicum](https://phonexicum.github.io/infosec/xxe.html)