General
HTTP Status Codes
- 100-199: Information
- 200-299: Success
- 300-399: Redirect
- 400-499: Client error
- 500-599: Server errorcURL
# Header
curl -I
# Send a cookie
curl --cookie "<cookie_name>=<cookie_value>"
# POST request
curl -X POST --data "<param1>=<val1>&<param2>=<val2>"
# JSON request
curl -H 'Content-Type: application/json; charset=UTF-8' --data-binary '{"<param1>":"<val1>"}'
# Encode part of the request
curl -d "<param1>=<data1>" --data-urlencode "<param2>=<value2_to_be_encoded>" -X POSTFile Inclusion
Directory traversal vulnerabilities allow reading files outside the web root, while file inclusion vulnerabilities can execute local or remote files by including them in the application’s code.
LFI
RFI
Wordpress 404 RCE
target.tld/wp-content/themes/twentytwentytwo/404.php`
RCE via Wordpress Plugin Editor
Shellshock
Log4J
Text4Shell
File Uploads
Web Shells
ASPX Upload
/usr/share/webshells/aspx/cmdasp.aspx
Bypasses
Webdav
GIT
Tomcat
Last updated
