From 2f5e4ade01dedcd827ec122327e5800d80d50641 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Thu, 12 Dec 2024 12:33:56 +0100 Subject: [PATCH] a --- .../8009-pentesting-apache-jserv-protocol-ajp.md | 1 + network-services-pentesting/8089-splunkd.md | 1 + network-services-pentesting/pentesting-pop.md | 1 + network-services-pentesting/pentesting-web/drupal/README.md | 1 + .../server-side-inclusion-edge-side-inclusion-injection.md | 1 + 5 files changed, 5 insertions(+) diff --git a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md index d9c79c2b2e6..7b7610489fe 100644 --- a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md +++ b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md @@ -143,6 +143,7 @@ Stay informed with the newest bug bounties launching and crucial platform update Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks diff --git a/network-services-pentesting/8089-splunkd.md b/network-services-pentesting/8089-splunkd.md index 9b7dc97b075..fd6f6ec941a 100644 --- a/network-services-pentesting/8089-splunkd.md +++ b/network-services-pentesting/8089-splunkd.md @@ -15,6 +15,7 @@ Learn & practice GCP Hacking: {% endhint %} + ## **Basic Information** * Log analytics tool used for data gathering, analysis, and visualization diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md index dc3e3596cbf..9f4da260672 100644 --- a/network-services-pentesting/pentesting-pop.md +++ b/network-services-pentesting/pentesting-pop.md @@ -98,6 +98,7 @@ root@kali:~# telnet $ip 110 POP servers with the setting **`auth_debug`** enabled will be increasing the logs generated. However, if **`auth_debug_passwords`** or **`auth_verbose_passwords`** are set as **`true`**, password could be also logged in clear text in those logs. + ## HackTricks Automatic Commands ``` diff --git a/network-services-pentesting/pentesting-web/drupal/README.md b/network-services-pentesting/pentesting-web/drupal/README.md index a78ec7b3b4c..21711800c23 100644 --- a/network-services-pentesting/pentesting-web/drupal/README.md +++ b/network-services-pentesting/pentesting-web/drupal/README.md @@ -125,6 +125,7 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks diff --git a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md index d94f7ec3acb..a2feee0f4a4 100644 --- a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md +++ b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md @@ -250,6 +250,7 @@ Check the XSLT page: [xslt-server-side-injection-extensible-stylesheet-language-transformations.md](xslt-server-side-injection-extensible-stylesheet-language-transformations.md) {% endcontent-ref %} + ### References * [https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/](https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/)