- Visit "http://192.168.58.168/acp2se/mul/muladmin.php" and login with "admin" / "adminpass"
- In the field "Put the name of the new Admin" enter the following payload "><svg onload=prompt(document.cookie)>
Wednesday, 19 February 2025
Friday Fun Pentest Series - 19 - Self Stored XSS - acp2sev7.2.2
Sunday, 16 February 2025
New Web Security Training Course !
Its been a while since I have released any papers related to web security. Without any further delay let me introduce you the "Web Security Training" training manual.
Introduction
Aimed at those that would like to learn more about web security and web app pentesting. The "course" is freely available, with taking the approach of "learn as you practice".
Each topic has a few bullet points describing what the vulnerability entails, then a screenshot and relevant payload, demonstrating the exploitation of the misconfiguration or the relevant issue.
Download Link
File is in PDF format. Requires the download of a VM (virtual machine) OWASP BWA. The course demonstrates OWASP Top 10 flaws and beyond. It is free of charge. Worth mentioning how good the "Mutillidae" web application is for training purposes.
https://drive[dot]google[dot]com/file/d/14FWeVKHz00hIrZH9x6Z4B5MHPH2K3cAu/view?usp=sharing
Friday Fun Pentest Series - 19 - Self Stored XSS - acp2sev7.2.2
Description - It was found that the application had problems around sanitizing and output encoding correctly, leading to Self Stored XSS. Se...

-
Description - It was found that the application suffers from business logic flaw - Additionally the application is vulnerable to username en...
-
Description - It was found that the application suffers from Blind SQL injection Blind SQL Injection Steps to Reproduce: Login to applicat...
-
Description - It was found that the application is suffering from code injection vulnerability - The flaw allows the attacker to inject PHP ...