General

HTTP Status Codes

- 100-199: Information
- 200-299: Success
- 300-399: Redirect
- 400-499: Client error
- 500-599: Server error

cURL

# Header
curl -I

# Send a cookie
curl --cookie "<cookie_name>=<cookie_value>"

# POST request
curl -X POST --data "<param1>=<val1>&<param2>=<val2>"

# JSON request
curl -H 'Content-Type: application/json; charset=UTF-8' --data-binary '{"<param1>":"<val1>"}'

# Encode part of the request
curl -d "<param1>=<data1>" --data-urlencode "<param2>=<value2_to_be_encoded>" -X POST

File Inclusion

Directory traversal vulnerabilities allow reading files outside the web root, while file inclusion vulnerabilities can execute local or remote files by including them in the application’s code.

LFI

RFI

Wordpress 404 RCE

target.tld/wp-content/themes/twentytwentytwo/404.php`

RCE via Wordpress Plugin Editor

Shellshock

Log4J

Text4Shell

File Uploads

Web Shells

ASPX Upload

  • /usr/share/webshells/aspx/cmdasp.aspx

Bypasses

Webdav

GIT

Tomcat

Last updated