WriteUps
LinkedinGithub
  • hackthebox
    • machines
      • Help
      • Bank
      • Busqueda
      • Agile
      • Nodeblog
      • Cerberus
      • Forest
      • Active
      • Academy
      • Beep
      • Traversxec
      • Stocker
      • Soccer
      • Awkward
    • challenges
      • pwn
        • Racecar
        • Hunting
        • You know 0xDiablos
        • Restaurant
  • Binary Exploitation
    • ROP Emporium
      • ret2win32
      • ret2win64
      • split32
      • split64
      • callme32
      • callme64
      • write432
      • write464
  • CTF
    • Nullcon Berlin HackIM CTF 2023
      • Crypto
        • Twin
        • Bmpass
      • Web
        • reguest
        • zpr
    • Intigriti 1337UP LIVE CTF 2022
      • PWN challenges
        • Easy Register
        • Search Engine
    • ENSA SICS CTF 2023
      • Reverse Engineering Challenges
        • S3r14l_Br34k3r
        • R3v_m3
        • End14n_X0R
      • Forensics Challenges
        • Fl4g_Tr4nsf3r_Pr0t0c0l
        • Th3_Uncr4ck4ble_P@$$w0rd
        • h1d33n
        • MR-ROBOT
        • T0p_S3cr3t_0p3r4ti0ns
        • N545
      • Misc Challenges
        • M3t4 M4dn3$$
      • Cryptography Challenges
        • C1PH3R_Huh
        • Warm Up
        • V0y
        • Crypt1c_0bFuSc4t10n
      • Osint Challenges
        • whoami
    • DownUnderCTF 2023
      • Web
        • Proxed
        • actually-proxed
        • grades_grades_grades
    • Urmia CTF 2023
      • Web
        • htaccess
        • Captcha1 | the Missing Lake
        • Captcha2 | the Missing Lake
        • Ecorp
      • Steganography
        • Deb File | The Old Systems
        • Dorna
    • Nullcon HackIM CTF Goa 2023
      • Web
        • Debugger
        • TYPicalBoss
        • IPfilter
    • TJCTF 2023
      • web/outdated
    • Cyber Heroines CTF 2023
      • Web
        • Grace Hopper
        • Radia Perlman
        • Shafrira Goldwasser
      • Forensics
        • Barbara Liskov
        • Margaret Hamilton
        • Elizabeth Feinler
    • Cybercoliseum II CTF 2023
      • Forensics
        • encrypted traffic
    • Huntress CTF 2023
      • Forensics
        • Opposable Thumbs
        • Wimble
    • The Cyber Cooperative CTF 2023
      • pwn
        • crashme
        • medbof
      • rev
        • easycrack
      • web
        • Leaky site
    • niteCTF2023
      • pwn
        • The road not taken
      • misc
        • blindjail
      • crypto
        • babyRSA
    • KnightCTF2024
      • web
        • Readme
        • Kitty
      • pwn
        • Get The Sword
        • The Dragon's Secret Scroll
        • win... win... window...!
    • Cyber Apocalypse 2024: Hacker Royale
      • Crypto
        • Primary Knowledge
        • Iced TEA
        • Blunt
      • Rev
        • BoxCutter
        • PackedAway
        • LootStash
      • Forensics
        • Fake Boost
        • Data Siege
        • Game Invitation
      • Pwn
        • Rocket Blaster XXX
        • Writing on the Wall
        • Pet Companion
  • Malware Developement
    • Essentials
      • EXE vs DLL
      • Payload Storage
        • Storing Payload in .text Section
        • Storing Payload in .data Section
        • Storing Payload in .rsrc Section
      • Dropper Project
      • Function call obfuscation
  • Portswigger
    • HTTP Host header attacks
      • Basic password reset poisoning
      • Host header authentication bypass
      • Web cache poisoning via ambiguous requests
      • Routing-based SSRF
      • SSRF via flawed request parsing
    • XXE - XML EXTERNAL ENTITIES
      • Exploiting XXE using external entities to retrieve files
      • Exploiting XXE to perform SSRF attacks
      • Blind XXE with out-of-band interaction
      • Blind XXE with out-of-band interaction via XML parameter entities
      • Exploiting blind XXE to exfiltrate data using a malicious external DTD
      • Exploiting blind XXE to retrieve data via error messages
      • Exploiting XInclude to retrieve files
      • Exploiting XXE via image file upload
      • Exploiting XXE to retrieve data by repurposing a local DTD
    • XSS
      • 1) Reflected XSS into HTML context with nothing encoded
      • 2) Stored XSS into HTML context with nothing encoded
      • 3) DOM XSS in document.write sink using source location.search
      • 4) DOM XSS in innerHTML sink using source location.search
      • 5) DOM XSS in jQuery anchor href attribute sink using location.search source
      • 6) DOM XSS in jQuery selector sink using a hashchange event
      • 7) Reflected XSS into attribute with angle brackets HTML-encoded
      • 8) Stored XSS into anchor href attribute with double quotes HTML-encoded
      • 9) Reflected XSS into a JavaScript string with angle brackets HTML encoded
      • 10) DOM XSS in document.write sink using source location.search inside a select element
      • 11) DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
      • 12) Reflected DOM XSS
      • 13) Stored DOM XSS
      • 14) Reflected XSS into HTML context with most tags and attributes blocked
      • 15) Reflected XSS into HTML context with all tags blocked except custom ones
      • 16) Reflected XSS with some SVG markup allowed
      • 17) Reflected XSS in canonical link tag
      • 18) Reflected XSS into a JavaScript string with single quote and backslash escaped
      • 19) Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped
      • 20) Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped
      • 21) Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped
      • 22) Exploiting cross-site scripting to steal cookies
      • 23) Exploiting cross-site scripting to capture passwords
  • Windows
    • Windows Persistance
      • Tampering with Unprivileged Accounts
      • Backdooring Files
      • Abusing Services
      • Abusing Scheduled Tasks
      • Startup Folder
  • Vulnhub
    • how to make virtual box machines work in vmware also ?
    • Mr Robot 1
  • DFIR
    • HTB forensics challenges
      • Reminiscent
      • RogueOne
    • memory forensics
      • KnightCTF 2024 mem challenges
  • Forensics
    • Memory forensics
    • Oxygen Forensic
  • Malware Analysis
    • WannaCry Ransomware
    • Copy of WannaCry Ransomware
Powered by GitBook
On this page

Was this helpful?

Windows

Windows Persistance
Previous23) Exploiting cross-site scripting to capture passwordsNextWindows Persistance

Was this helpful?