Understand your Mac and iPhone more deeply by tracing the evolution of Mac OS X from prelease to Swift. John Siracusa delivers the details.
You've got two main options:
sql injection on user parameter. since, api.php file doesnt need any authentication attacker can exploit this vulnerability without any valid session or credentials.
GET /voipmonitorpath/api.php?action=login&user=[inject_here]&pass=trollz HTTP/1.1
Host: vulnerableinstance
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8| require 'optparse' | |
| require 'net/http' | |
| require 'mime/types' | |
| require 'uri' | |
| def make_request (uri, header = {}, post_body = "") | |
| http = Net::HTTP.new(uri.host, uri.port) | |
| request = Net::HTTP::Post.new(uri.request_uri, header) | |
| request.body = post_body | |
| response = http.request(request) |
| flame='\xF0\x9F\x94\xA5' #🔥 | |
| snow='\xE2\x9D\x84 ' # ❄ | |
| gear='\xE2\x9A\x99\xEF\xB8\x8F' | |
| ignis_color='048' | |
| SEGMENT_SEPARATOR=$'\ue0b0' | |
| prompt_segment() { | |
| local bg fg |
| { | |
| "30523382": { | |
| "className": "Proxy", | |
| "data": { | |
| "bypassFPForPAC": true, | |
| "color": "#f57575", | |
| "configUrl": "", | |
| "credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=", | |
| "cycle": false, | |
| "enabled": true, |
| var p=Array.prototype.slice.call(document.querySelectorAll(".fc-ab-root"));p.forEach(function(o){o.parentNode.removeChild(o)}),document.body.style.overflow="auto"; |
| command! -nargs=+ FridaV call FridaV(<f-args>) | |
| command! -nargs=+ Frida call Frida(<f-args>) | |
| function! FridaV( ... ) | |
| let class = split(a:1,"\\V.") | |
| let last = class[len(class)-1] | |
| let S = ":normal i" | |
| let S .= "\tvar %s = Java.use(\"%s\")\n" | |
| execute printf(S,last,a:1) | |
| call Frida(last,a:2,a:3) |
| // install package with adb install package.name | |
| // do not open application | |
| // use -f force option | |
| // frida -U -f package.name -l del.js | |
| Java.perform(function() { | |
| var ssl = Java.use("k.x$b") | |
| var channel = Java.use("f.e.c.b.g.f.g.a.c") | |
| var Integer = Java.use("java.lang.Integer"); | |
| var ArrayList = Java.use("java.util.ArrayList"); | |
| var ArrayList = Java.use("java.util.ArrayList"); |
| <html> | |
| <head> | |
| <title>Form ve Elemanları</title> | |
| <link rel="stylesheet" href="main.css" /> | |
| </head> | |
| <body> | |
| <!-- | |
| - adı * |
| <!DOCTYPE html> | |
| <html lang="en"> | |
| <head> | |
| <meta charset="UTF-8"> | |
| <title>Title</title> | |
| </head> | |
| <body> | |
| <form id = "csrf_form" method = "POST" action = "http://127.0.0.1:8000/user/name"> | |
| <input type = "text" name = "name" value = "hhh"> | |
| <form> |