You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Payload used for checking of existence of WAF/IPS (dummier the better)
539
-
IDS_WAF_CHECK_PAYLOAD="AND 1=1 UNION ALL SELECT 1,NULL,'<script>alert(\"XSS\")</script>',table_name FROM information_schema.tables WHERE 2>1--/**/; EXEC xp_cmdshell('cat ../../../etc/passwd')#"
539
+
IPS_WAF_CHECK_PAYLOAD="AND 1=1 UNION ALL SELECT 1,NULL,'<script>alert(\"XSS\")</script>',table_name FROM information_schema.tables WHERE 2>1--/**/; EXEC xp_cmdshell('cat ../../../etc/passwd')#"
540
540
541
541
# Vectors used for provoking specific WAF/IPS behavior(s)
542
542
WAF_ATTACK_VECTORS= (
543
543
"", # NIL
544
544
"search=<script>alert(1)</script>",
545
545
"file=../../../../etc/passwd",
546
546
"q=<invalid>foobar",
547
-
"id=1 %s"%IDS_WAF_CHECK_PAYLOAD
547
+
"id=1 %s"%IPS_WAF_CHECK_PAYLOAD
548
548
)
549
549
550
550
# Used for status representation in dictionary attack phase
0 commit comments