Summary

R3zk0n · October 2, 2025

Contents

    MySQL Injection

    • Blind-based SQL Injection
    • Retrieve User Hash Insecure File Upload
    • via Zip File
    • Directory Traversal in Zip
    • Bypass File Extension Blacklist

    Type Juggling

    • Loose Comparison
      • Using exponents to compare integer with string
      • Brute-force until a valid string is discovered where user-controlled exponent == ‘0’

    Postgresql SQL Injection

    • Stacked Queries
    • Union-based
    • Union + Boolean-based
    • Time-based Postgresql Reverse Shell
    • COPY TO
    • UDF Reverse Shell (Windows + Linux)
    • Postgres Large Objects

    NodeJS Eval

    • Bypass Regex Filter
    • Bypass ‘/’ via Hex Encoding

    Cookie Deserialization

    • https://github.com/pwntester/ysoserial.net

    Server-Side Template Injection

    • MariaDB Multiline SQL Injection
      • Union-based SQL Injection
      • Retrieve Admin Password Reset
        • Union + Collation (Same Encoding)
    • Render Function SSTI
      • Jinja Filter Evasion
      • Subprocess Popen Remote Command Execution

    XML External Entity + Insecure Password Randomization

    • Predictable Randomization
      • Using current time to generate password reset token
      • Automating password reset
    • Error-based XXE in API
      • Access to Tomcat Manager
      • Access to HSQLDB Manager
        • Retrieve JDBC connection string with sensitive credentials
    • HSQLDB
      • Create remote Java function
      • Leverage remote function to call Write function
      • Execute RCE via JSP shell

    Advanced XSS Exploitation

    • Sitemap and Third Party Library Enumeration
    • DOM-based Cross-site Scripting
      • Writing to DOM and creating a fake landing page
      • Database + APIs to steal authenticated access
      • Scrape contents
    • Websocket
      • Running arbitrary commands

    CSRF + CORS to RCE

    • Unsafe CORS headers
      • Bypassing SameSite Attribute
    • Insecure Defaults

    Server-Side Request Forgery

    • Web Service Verb Tampering Enumeration
    • Blind SSRF
      • Port and Subnet Scanning via SSRF
      • Exploiting Headless Chrome

    Prototype Pollution

    • Locate Prototype Pollution in Extend, Merge or Set
    • Exploit AST Injection, or remote code execution via Templates

    Twitter, Facebook