feat: 🚚 Create readme for each categories and clean repo
This commit is contained in:
11
CSP Bypass/README.md
Normal file
11
CSP Bypass/README.md
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Low
|
||||||
|
```javascript
|
||||||
|
console.log("Welcome the the hacking word");
|
||||||
|
```
|
||||||
|
> Upload this script to pastebin
|
||||||
|
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
|
||||||
|
# High
|
||||||
|
> In progress
|
@ -1,2 +0,0 @@
|
|||||||
console.log("Welcome the the hacking word");
|
|
||||||
// Export this script to pastebin
|
|
10
Command Injection/README.md
Normal file
10
Command Injection/README.md
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
# Low
|
||||||
|
```bash
|
||||||
|
127.0.0.1 && ls
|
||||||
|
```
|
||||||
|
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
|
||||||
|
# High
|
||||||
|
> In progress
|
8
File injection/README.md
Normal file
8
File injection/README.md
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# Low
|
||||||
|
Just upload the file `file-inject-low.png` and you will get the flag.
|
||||||
|
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
|
||||||
|
# High
|
||||||
|
> In progress
|
@ -1,3 +1,12 @@
|
|||||||
|
# Low
|
||||||
|
```javascript
|
||||||
const phrase = document.getElementById("phrase").value;
|
const phrase = document.getElementById("phrase").value;
|
||||||
const token = md5(rot13(phrase));
|
const token = md5(rot13(phrase));
|
||||||
console.log(token);
|
console.log(token);
|
||||||
|
```
|
||||||
|
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
|
||||||
|
# High
|
||||||
|
> In progress
|
9
README.md
Normal file
9
README.md
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
# EPITA-DVWA
|
||||||
|
|
||||||
|
My journey through application vulnerability using Damn Vulnerable Web Application (DVWA).
|
||||||
|
|
||||||
|
## What is DVWA?
|
||||||
|
DVWA is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
|
||||||
|
|
||||||
|
## How this repository is organized?
|
||||||
|
This repository is organized by the different vulnerabilities that I have found in DVWA. Each vulnerability has its own folder and contains a README.md file that explains the vulnerability and how to exploit it.
|
7
SQL Injection/README.md
Normal file
7
SQL Injection/README.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Low
|
||||||
|
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
||||||
|
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
# High
|
||||||
|
> In progress
|
@ -1 +0,0 @@
|
|||||||
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
|
8
XSS (DOM)/README.md
Normal file
8
XSS (DOM)/README.md
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# Low
|
||||||
|
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()
|
||||||
|
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
|
||||||
|
# High
|
||||||
|
> In progress
|
@ -1 +0,0 @@
|
|||||||
http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>
|
|
9
XSS (Stored)/README.md
Normal file
9
XSS (Stored)/README.md
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
# Low
|
||||||
|
```javascript
|
||||||
|
<script>alert("XSS");</script>
|
||||||
|
````
|
||||||
|
# Medium
|
||||||
|
> In progress
|
||||||
|
|
||||||
|
# High
|
||||||
|
> In progress
|
Reference in New Issue
Block a user