From e74dedab09d411b59926d68d2a2a5bc7d1f801b4 Mon Sep 17 00:00:00 2001 From: Mariusz Date: Tue, 29 Jan 2019 11:24:26 +0100 Subject: [PATCH] Update README.md --- web/payloads/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/web/payloads/README.md b/web/payloads/README.md index fef94d7..ac29f6c 100644 --- a/web/payloads/README.md +++ b/web/payloads/README.md @@ -1,4 +1,4 @@ ## Web Applications penetration testing related PAYLOADS that are actually useful -- **`Server-Side-Template-Injections.txt`** - Various Server-Side Template Injection static payloads, targeting couple of various templating implementations (also some of the Client-Side ones like in AngularJS). The evaluated expression to look/grep for is: **1868686868**. Use it with Burp Intruder's Grep functionality, or simply look out for that pattern while hanging around the application. ([gist](https://gist.github.com/mgeeky/2b660ab8d3946eec519731ed9ec5d25b)) +- **`Server-Side-Template-Injections.txt`** - Various Server-Side Template Injection static payloads, targeting couple of various templating implementations (also some of the Client-Side ones like in AngularJS). The evaluated expression to look/grep for is: **1868686868** or **aaaaaaaaaaaaaaaaaaaaaabbbbbbbbbbbbbbbbbbbbbbbbb**. Use it with Burp Intruder's Grep functionality, or simply look out for that pattern while hanging around the application. ([gist](https://gist.github.com/mgeeky/2b660ab8d3946eec519731ed9ec5d25b))