From a89f4285fba4115d45ad6efca91e546663758a17 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Thu, 12 Dec 2024 19:32:34 +0100 Subject: [PATCH] a --- .../8009-pentesting-apache-jserv-protocol-ajp.md | 1 - network-services-pentesting/8089-splunkd.md | 3 +-- network-services-pentesting/pentesting-pop.md | 3 +-- network-services-pentesting/pentesting-web/drupal/README.md | 3 +-- .../pentesting-web/drupal/drupal-rce.md | 1 + .../server-side-inclusion-edge-side-inclusion-injection.md | 3 +-- 6 files changed, 5 insertions(+), 9 deletions(-) diff --git a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md index 7b7610489..d9c79c2b2 100644 --- a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md +++ b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md @@ -143,7 +143,6 @@ Stay informed with the newest bug bounties launching and crucial platform update Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) -
Support HackTricks diff --git a/network-services-pentesting/8089-splunkd.md b/network-services-pentesting/8089-splunkd.md index fd6f6ec94..f42f6d0f1 100644 --- a/network-services-pentesting/8089-splunkd.md +++ b/network-services-pentesting/8089-splunkd.md @@ -15,7 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} - ## **Basic Information** * Log analytics tool used for data gathering, analysis, and visualization @@ -148,4 +147,4 @@ Learn & practice GCP Hacking: -{% endhint %} +{% endhint %} \ No newline at end of file diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md index 9f4da2606..a33d01c63 100644 --- a/network-services-pentesting/pentesting-pop.md +++ b/network-services-pentesting/pentesting-pop.md @@ -98,7 +98,6 @@ root@kali:~# telnet $ip 110 POP servers with the setting **`auth_debug`** enabled will be increasing the logs generated. However, if **`auth_debug_passwords`** or **`auth_verbose_passwords`** are set as **`true`**, password could be also logged in clear text in those logs. - ## HackTricks Automatic Commands ``` @@ -155,4 +154,4 @@ Learn & practice GCP Hacking: -{% endhint %} +{% endhint %} \ No newline at end of file diff --git a/network-services-pentesting/pentesting-web/drupal/README.md b/network-services-pentesting/pentesting-web/drupal/README.md index 21711800c..8711cbe90 100644 --- a/network-services-pentesting/pentesting-web/drupal/README.md +++ b/network-services-pentesting/pentesting-web/drupal/README.md @@ -125,7 +125,6 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) -
Support HackTricks @@ -135,4 +134,4 @@ Learn & practice GCP Hacking: 
 * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
 
 </details>
-{% endhint %}
+{% endhint %}
\ No newline at end of file
diff --git a/network-services-pentesting/pentesting-web/drupal/drupal-rce.md b/network-services-pentesting/pentesting-web/drupal/drupal-rce.md
index e77bca08c..f3932d8aa 100644
--- a/network-services-pentesting/pentesting-web/drupal/drupal-rce.md
+++ b/network-services-pentesting/pentesting-web/drupal/drupal-rce.md
@@ -263,6 +263,7 @@ Thank you for taking the time to read this article, I hope it will help you get
 Learn & practice AWS Hacking:<img src=[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks diff --git a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md index a2feee0f4..e42c57d30 100644 --- a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md +++ b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md @@ -250,7 +250,6 @@ Check the XSLT page: [xslt-server-side-injection-extensible-stylesheet-language-transformations.md](xslt-server-side-injection-extensible-stylesheet-language-transformations.md) {% endcontent-ref %} - ### References * [https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/](https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/) @@ -274,4 +273,4 @@ Learn & practice GCP Hacking: -{% endhint %} +{% endhint %} \ No newline at end of file