Использование полезных нагрузок (пейлоадов) позволяет проводить фаззинг веб-приложения, для выявления аномалий/признаков уязвимостей. В этой статье я рассмотрю несколько вариантов пейлоадов для тестирования веб-приложений.
.ftpquota
.gem
.gfclient/
.gfclient/pass
.git
.git-credentials
.git-rewrite/
.git/
.git/config
.git/HEAD
.git/index
.git/logs/
CRLF injection;
Methodology and Resources;
Remote commands execution;
Web cache deception;
CSV injection;
NoSQL injection;
Server Side Template injections;
XPATH injection;
CVE Exploits;
OAuth;
SQL injection;
XSS injection
File Inclusion - Path Traversal;
Open redirect;
SSRF injection;
XXE injections;
Insecured source code management;
PHP juggling type;
Tar commands execution;
Java Deserialization;
PHP serialization;
Traversal directory.
XSS-BYPASS-STRINGS-BRUTELOGIC.txt;
XSS-BruteLogic.txt;
XSS-JHADDIX.txt;
XSS-RSNAKE.txt;
XSS-Vectors-Mario.txt;
XSS-WITH-CONTEXT-JHADDIX.txt.
MSSQL-Enumeration.fuzzdb.txt;
MSSQL.fuzzdb.txt;
MYSQL.fuzzdb.txt;
Metacharacters.fuzzdb.txt;
MySQL-Read-Local-Files.fuzzdb.txt;
MySQL-SQLi-Login-Bypass.fuzzdb.txt;
NoSQL.txt.
01_burpattack_basic_methods;
01_burpattack_dirbuster;
01_burpattack_fast_fuzz;
02_burpattack_vulnerabilities_all;
03_burpattack_find_inject;
03_burpattack_find_injectx;
04_burpattack_basic_fuzz;
04_burpattack_sqli_quick_fuzz;
05_burpattack_full_fuzz;
burpattack_basic_auth_brute;
burpattack_brute_force;
burpattack_command_exec;
burpattack_find_injectx;
burpattack_nums_1-100;
burpattack_overflow;
burpattack_server_side_include;
burpattack_shellshock;
burpattack_sqli_authbypass;
burpattack_sqli_error_based;
burpattack_sqli_quick_fuzz;
burpattack_sqli_time_based;
burpattack_url_attacks;
burpattack_wordpress;
burpattack_xmlrpc_dos;
burpattack_xpath_injection;
burpattack_xss;
burpattack_xss_stored;
burpattack_xxe;
burpconfig_default;
burprepeater_xxe;
shellshock_attack.
business-logic;
control-chars;
disclosure-directory;
disclosure-localpaths/unix;
disclosure-source;
email;
file-upload;
format-strings;
html_js_fuzz;
http-protocol;
integer-overflow;
ip;
json;
ldap;
lfi;
mimetypes;
no-sql-injection;
os-cmd-execution;
os-dir-indexing;
path-traversal;
redirect;
rfi;
server-side-include;
sql-injection;
string-expansion;
unicode;
xml;
xpath;
xss.
apache-user-enum-1.0.txt;
apache-user-enum-2.0.txt;
directory-list-1.0.txt;
directory-list-2.3-big.txt;
directory-list-2.3-medium.txt;
directory-list-2.3-small.txt;
directory-list-lowercase-2.3-big.txt;
directory-list-lowercase-2.3-medium.txt;
directory-list-lowercase-2.3-small.txt.
К сожалению, не доступен сервер mySQL