diff --git a/.gitbook/assets/image (21) (2) (1).png b/.gitbook/assets/image (21) (2) (1).png
new file mode 100644
index 000000000..638590f69
Binary files /dev/null and b/.gitbook/assets/image (21) (2) (1).png differ
diff --git a/.gitbook/assets/image (21) (2).png b/.gitbook/assets/image (21) (2).png
index 638590f69..efd765a7c 100644
Binary files a/.gitbook/assets/image (21) (2).png and b/.gitbook/assets/image (21) (2).png differ
diff --git a/.gitbook/assets/image (21).png b/.gitbook/assets/image (21).png
index efd765a7c..5895dc2dd 100644
Binary files a/.gitbook/assets/image (21).png and b/.gitbook/assets/image (21).png differ
diff --git a/.gitbook/assets/image (4) (6).png b/.gitbook/assets/image (4) (6).png
new file mode 100644
index 000000000..e0409d6bf
Binary files /dev/null and b/.gitbook/assets/image (4) (6).png differ
diff --git a/.gitbook/assets/image (4).png b/.gitbook/assets/image (4).png
index e0409d6bf..5fd0b4257 100644
Binary files a/.gitbook/assets/image (4).png and b/.gitbook/assets/image (4).png differ
diff --git a/.gitbook/assets/image (5) (2) (2).png b/.gitbook/assets/image (5) (2) (2).png
new file mode 100644
index 000000000..23752da4a
Binary files /dev/null and b/.gitbook/assets/image (5) (2) (2).png differ
diff --git a/.gitbook/assets/image (5) (2).png b/.gitbook/assets/image (5) (2).png
index 23752da4a..8d9417666 100644
Binary files a/.gitbook/assets/image (5) (2).png and b/.gitbook/assets/image (5) (2).png differ
diff --git a/.gitbook/assets/image (5).png b/.gitbook/assets/image (5).png
index 8d9417666..114d35653 100644
Binary files a/.gitbook/assets/image (5).png and b/.gitbook/assets/image (5).png differ
diff --git a/pentesting-web/email-injections.md b/pentesting-web/email-injections.md
index a4b15de6e..35b73c8d1 100644
--- a/pentesting-web/email-injections.md
+++ b/pentesting-web/email-injections.md
@@ -106,7 +106,7 @@ The symbols: **+, -** and **{}** in rare occasions can be used for tagging and i
### Whitelist bypass
-
+
### Quotes
diff --git a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md
index 3e408f27c..f9472f316 100644
--- a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md
+++ b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md
@@ -2,13 +2,13 @@
-ποΈ HackTricks LIVE Twitch Wednesdays 5.30pm (UTC) ποΈ - π₯ Youtube π₯
+ποΈ HackTricks LIVE TwitchWednesdays 5.30pm (UTC) ποΈ -π₯ Youtube π₯
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Join the** [**π¬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**π¦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
-* **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
+* **Share your hacking tricks by submitting PRs to the** [**hacktricks repo**](https://github.com/carlospolop/hacktricks) **and** [**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud).
@@ -25,7 +25,7 @@ And, when the page is served, this fragment will be evaluated and replaced with
The decision of when to use SSI, and when to have your page entirely generated by some program, is usually a matter of how much of the page is static, and how much needs to be recalculated every time the page is served. SSI is a great way to add small pieces of information, such as the current time - shown above. But if a majority of your page is being generated at the time that it is served, you need to look for some other solution. (Definition taken from [here](https://httpd.apache.org/docs/current/howto/ssi.html)).
-You can infer the presence of SSI if the web application uses files with the extensions ** `.shtml`, `.shtm` or `.stm`**, but it's not only the case.
+You can infer the presence of SSI if the web application uses files with the extensions \*\* `.shtml`, `.shtm` or `.stm`\*\*, but it's not only the case.
A typical SSI expression has the following format:
@@ -79,18 +79,22 @@ The following **header** in a response from the server means that the server is
Surrogate-Control: content="ESI/1.0"
```
-If you can't find this header, the server might be using ESI anyways.\
+If you can't find this header, the server **might be using ESI anyways**.\
A **blind exploitation approach can also be used** as a request should arrive to the attackers server:
```javascript
// Basic detection
-o
+// If previous is reflected as "hello", it's vulnerable
+
+// Blind detection
+
// XSS Exploitation Example
->
+
// Cookie Stealer (bypass httpOnly flag)
-
+
// Introduce private local files (Not LFI per se)
@@ -132,15 +136,36 @@ The file _http://attacker.com/xss.html_ may contain a XSS payload like `