Skip to content

Commit 118924f

Browse files
committed
Challenges added for CRLF, Command Injection, File Inclusion
1 parent 0a5ecc4 commit 118924f

File tree

5 files changed

+20
-6
lines changed

5 files changed

+20
-6
lines changed

CRLF Injection/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
* [Add a cookie](#add-a-cookie)
1212
* [Add a cookie - XSS Bypass](#add-a-cookie---xss-bypass)
1313
* [Write HTML](#write-html)
14-
* [Filter Bypass](#filter-bypass)
14+
* [Filter Bypass](#filter-bypass)
1515
* [Labs](#labs)
1616
* [References](#references)
1717

@@ -97,7 +97,7 @@ Content-Length: 34
9797
```
9898

9999

100-
## Filter Bypass
100+
### Filter Bypass
101101

102102
Using UTF-8 encoding
103103

@@ -116,6 +116,7 @@ Remainder:
116116
## Labs
117117

118118
* [PortSwigger - HTTP/2 request splitting via CRLF injection](https://portswigger.net/web-security/request-smuggling/advanced/lab-request-smuggling-h2-request-splitting-via-crlf-injection)
119+
* [Root Me - CRLF](https://www.root-me.org/en/Challenges/Web-Server/CRLF)
119120

120121

121122
## References

Command Injection/README.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -423,7 +423,10 @@ In Unix-like command-line interfaces, the `--` symbol is used to signify the end
423423
* [PortSwigger - Blind OS command injection with output redirection](https://portswigger.net/web-security/os-command-injection/lab-blind-output-redirection)
424424
* [PortSwigger - Blind OS command injection with out-of-band interaction](https://portswigger.net/web-security/os-command-injection/lab-blind-out-of-band)
425425
* [PortSwigger - Blind OS command injection with out-of-band data exfiltration](https://portswigger.net/web-security/os-command-injection/lab-blind-out-of-band-data-exfiltration)
426-
426+
* [Root Me - PHP - Command injection](https://www.root-me.org/en/Challenges/Web-Server/PHP-Command-injection)
427+
* [Root Me - Command injection - Filter bypass](https://www.root-me.org/en/Challenges/Web-Server/Command-injection-Filter-bypass)
428+
* [Root Me - PHP - assert()](https://www.root-me.org/en/Challenges/Web-Server/PHP-assert)
429+
* [Root Me - PHP - preg_replace()](https://www.root-me.org/en/Challenges/Web-Server/PHP-preg_replace)
427430

428431
### Challenge
429432

File Inclusion/README.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@
4141
- [LFI to RCE via PHP sessions](#lfi-to-rce-via-php-sessions)
4242
- [LFI to RCE via PHP PEARCMD](#lfi-to-rce-via-php-pearcmd)
4343
- [LFI to RCE via credentials files](#lfi-to-rce-via-credentials-files)
44+
- [Labs](#labs)
4445
- [References](#references)
4546

4647

@@ -661,6 +662,14 @@ Another way to gain SSH access to a Linux machine through LFI is by reading the
661662
If SSH is active check which user is being used `/proc/self/status` and `/etc/passwd` and try to access `/<HOME>/.ssh/id_rsa`.
662663

663664

665+
## Labs
666+
667+
* [Root Me - Local File Inclusion](https://www.root-me.org/en/Challenges/Web-Server/Local-File-Inclusion)
668+
* [Root Me - Local File Inclusion - Double encoding](https://www.root-me.org/en/Challenges/Web-Server/Local-File-Inclusion-Double-encoding)
669+
* [Root Me - Remote File Inclusion](https://www.root-me.org/en/Challenges/Web-Server/Remote-File-Inclusion)
670+
* [Root Me - PHP - Filters](https://www.root-me.org/en/Challenges/Web-Server/PHP-Filters)
671+
672+
664673
## References
665674

666675
* [Baby^H Master PHP 2017 - Orange Tsai (@orangetw) - Dec 5, 2021](https://github.com/orangetw/My-CTF-Web-Challenges#babyh-master-php-2017)

GraphQL Injection/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@
2222
- [JSON list based batching](#json-list-based-batching)
2323
- [Query name based batching](#query-name-based-batching)
2424
- [Injections](#injections)
25-
- [NOSQL injection](#nosql-injection)
26-
- [SQL injection](#sql-injection)
25+
- [NOSQL injection](#nosql-injection)
26+
- [SQL injection](#sql-injection)
2727
- [Labs](#labs)
2828
- [References](#references)
2929

Type Juggling/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,8 @@ The exploitation phase is the following:
144144

145145
## Labs
146146

147-
* [Root Me - PHP - type juggling](https://www.root-me.org/en/Challenges/Web-Server/PHP-type-juggling)
147+
* [Root Me - PHP - Type Juggling](https://www.root-me.org/en/Challenges/Web-Server/PHP-type-juggling)
148+
* [Root Me - PHP - Loose Comparison](https://www.root-me.org/en/Challenges/Web-Server/PHP-Loose-Comparison)
148149

149150

150151
## References

0 commit comments

Comments
 (0)