chore: add pre-commit hooks

chore: add pre-commit hooks

chore: add pre-commit hooks

chore: add pre-commit hooks

chore: add pre-commit hooks
This commit is contained in:
Nanne Baars
2023-12-06 16:10:19 +01:00
committed by Nanne Baars
parent d913967ec5
commit 17acef57b4
305 changed files with 1573 additions and 1656 deletions

View File

@ -9,4 +9,4 @@ In the exercises on the following pages, you need to examine what the browser se
== A New Era of SSRF by Orange Tsai
video::D1S-G8rJrEk[youtube, height=480, width=100%]
video::D1S-G8rJrEk[youtube, height=480, width=100%]

View File

@ -8,4 +8,3 @@ To prevent SSRF vulnerabilities in web applications, it is recommended to adhere
== References
* https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html

View File

@ -1,2 +1,2 @@
=== Find and modify the request to display Jerry
=== Find and modify the request to display Jerry
Click the button and figure out what happened.

View File

@ -6,4 +6,4 @@ ssrf.failure=You need to stick to the game plan!
ssrf.hint1=You should use an HTTP proxy to intercept the request and change the URL.
ssrf.hint2=If Tom is images/tom.png, Jerry would be images/jerry.png.
ssrf.hint3=You need to put the protocol, "http://" in front of ifconfig.pro.
ssrf.hint3=You need to put the protocol, "http://" in front of ifconfig.pro.

View File

@ -3,4 +3,4 @@ function submit_secret_credentials() {
xhttp['open']('POST', '#attack/307/100', true);
//sending the request is obfuscated, to descourage js reading
var _0xb7f9=["\x43\x61\x70\x74\x61\x69\x6E\x4A\x61\x63\x6B","\x42\x6C\x61\x63\x6B\x50\x65\x61\x72\x6C","\x73\x74\x72\x69\x6E\x67\x69\x66\x79","\x73\x65\x6E\x64"];xhttp[_0xb7f9[3]](JSON[_0xb7f9[2]]({username:_0xb7f9[0],password:_0xb7f9[1]}))
}
}