Skip to content

Latest commit

 

History

History
50 lines (21 loc) · 2.03 KB

Assignment 1_submission.md

File metadata and controls

50 lines (21 loc) · 2.03 KB

Assignment - 1

Markups and Screenshots for solving using DVWA

Command Injection -

On Security level - low : command 127.0.0.1; ls worked and showed this

low

But on medium security it didnt work. Even the command 127.0.0.1 && ls also didnt work so used only '&' to access the files i.e 127.0.0.1 & ls and could use other commands as cat.php like 127.0.0.1 & cat.php

c

Command Injection(High) -

Used command 127.0.0.1|ls i.e without space to bypass the checks

XSS(Reflected) -

On low security used payload <script>alert(1)</script> to redirect but on medium and high security ,script keyword is replaced so can use payload <scr<script>ipt>("You are hacked")</script> xss1

Can also use this -

xss

XSS(DOM) -

Added this payload to the url <img%20src/onerror=alert("hacked")>xss-dom

SQL Injection -

Inspected the page to change the value of any option to '1 or 1=1' (i.e. Always true condition) and got all the names. sql sql1

XSS(Stored) -

First used payload <script>alert(1)</script> but didnt worked. Also capitalizing it <SCRIPT>alert(1)</SCRIPT> didn't work. So enterded the payload in name column but it had restriction to the lengh so changed it by inspecting.