4.7 Input Validation Testing
Evidence:
You can use the previous payloads.
Evidence:
This section has been merged into: Test HTTP Methods
Evidence:
The results should be that the application takes the both parameters instead of only one of them.
Evidence:
SQL wordlist & NoSQL Payloads.
Evidence:
Evidence:
Evidence:
Evidence:
Evidence:
Evidence:
4.7.11 Testing for Code Injection
Website/URL Access Parameters
UNIX FI & Windows FI
Evidence:
Evidence:
Evidence:
Evidence:
Evidence:
Monitor all incoming and outgoing HTTP requests to the Web Server to inspect any suspicious requests.
Evidence:
Modify the value of the
Host
header in different endpoints on the application.Try to inject
%0d%0a
, which represents the CRLF, in order to perform HTTP Splitting.Try to use custom host headers to check if it changes the contents on the application.
Evidence:
Identify user input that gets reflected
Insert SSTI polyglots
${{<%[%'"}}%\
or payloads.
Identify the templating engine.
Build the exploit.
Evidence:
Identify function in the application that performs requests to external or internal sources or third parties.
Identify parameters with values that points to internal or external sources.
Test if the injection points are exploitable as in the "4.7.11 Testing for Code Injection".
Asses the severity of the vulnerability.
Evidence:
Last updated