chore: add pre-commit hooks
chore: add pre-commit hooks chore: add pre-commit hooks chore: add pre-commit hooks chore: add pre-commit hooks
This commit is contained in:
@ -9,4 +9,4 @@ In the exercises on the following pages, you need to examine what the browser se
|
||||
|
||||
== A New Era of SSRF by Orange Tsai
|
||||
|
||||
video::D1S-G8rJrEk[youtube, height=480, width=100%]
|
||||
video::D1S-G8rJrEk[youtube, height=480, width=100%]
|
||||
|
@ -8,4 +8,3 @@ To prevent SSRF vulnerabilities in web applications, it is recommended to adhere
|
||||
|
||||
== References
|
||||
* https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html
|
||||
|
||||
|
@ -1,2 +1,2 @@
|
||||
=== Find and modify the request to display Jerry
|
||||
=== Find and modify the request to display Jerry
|
||||
Click the button and figure out what happened.
|
||||
|
@ -6,4 +6,4 @@ ssrf.failure=You need to stick to the game plan!
|
||||
|
||||
ssrf.hint1=You should use an HTTP proxy to intercept the request and change the URL.
|
||||
ssrf.hint2=If Tom is images/tom.png, Jerry would be images/jerry.png.
|
||||
ssrf.hint3=You need to put the protocol, "http://" in front of ifconfig.pro.
|
||||
ssrf.hint3=You need to put the protocol, "http://" in front of ifconfig.pro.
|
||||
|
@ -3,4 +3,4 @@ function submit_secret_credentials() {
|
||||
xhttp['open']('POST', '#attack/307/100', true);
|
||||
//sending the request is obfuscated, to descourage js reading
|
||||
var _0xb7f9=["\x43\x61\x70\x74\x61\x69\x6E\x4A\x61\x63\x6B","\x42\x6C\x61\x63\x6B\x50\x65\x61\x72\x6C","\x73\x74\x72\x69\x6E\x67\x69\x66\x79","\x73\x65\x6E\x64"];xhttp[_0xb7f9[3]](JSON[_0xb7f9[2]]({username:_0xb7f9[0],password:_0xb7f9[1]}))
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user