From 606f4efbbcf22823a9f3b0bdac0b82eac685f0d0 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Thu, 12 Dec 2024 12:33:56 +0100 Subject: [PATCH] a --- .../8009-pentesting-apache-jserv-protocol-ajp.md | 1 + network-services-pentesting/8089-splunkd.md | 1 + network-services-pentesting/pentesting-pop.md | 1 + network-services-pentesting/pentesting-web/drupal/README.md | 1 + .../server-side-inclusion-edge-side-inclusion-injection.md | 1 + 5 files changed, 5 insertions(+) diff --git a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md index d9c79c2b2..7b7610489 100644 --- a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md +++ b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md @@ -143,6 +143,7 @@ Stay informed with the newest bug bounties launching and crucial platform update Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks diff --git a/network-services-pentesting/8089-splunkd.md b/network-services-pentesting/8089-splunkd.md index 9b7dc97b0..fd6f6ec94 100644 --- a/network-services-pentesting/8089-splunkd.md +++ b/network-services-pentesting/8089-splunkd.md @@ -15,6 +15,7 @@ Learn & practice GCP Hacking: {% endhint %} + ## **Basic Information** * Log analytics tool used for data gathering, analysis, and visualization diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md index dc3e3596c..9f4da2606 100644 --- a/network-services-pentesting/pentesting-pop.md +++ b/network-services-pentesting/pentesting-pop.md @@ -98,6 +98,7 @@ root@kali:~# telnet $ip 110 POP servers with the setting **`auth_debug`** enabled will be increasing the logs generated. However, if **`auth_debug_passwords`** or **`auth_verbose_passwords`** are set as **`true`**, password could be also logged in clear text in those logs. + ## HackTricks Automatic Commands ``` diff --git a/network-services-pentesting/pentesting-web/drupal/README.md b/network-services-pentesting/pentesting-web/drupal/README.md index a78ec7b3b..21711800c 100644 --- a/network-services-pentesting/pentesting-web/drupal/README.md +++ b/network-services-pentesting/pentesting-web/drupal/README.md @@ -125,6 +125,7 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks diff --git a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md index d94f7ec3a..a2feee0f4 100644 --- a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md +++ b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md @@ -250,6 +250,7 @@ Check the XSLT page: [xslt-server-side-injection-extensible-stylesheet-language-transformations.md](xslt-server-side-injection-extensible-stylesheet-language-transformations.md) {% endcontent-ref %} + ### References * [https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/](https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/)