Skip to content

Commit

Permalink
a
Browse files Browse the repository at this point in the history
  • Loading branch information
carlospolop committed Dec 12, 2024
1 parent 2f5e4ad commit a89f428
Show file tree
Hide file tree
Showing 6 changed files with 5 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,6 @@ Stay informed with the newest bug bounties launching and crucial platform update
Learn & practice AWS Hacking:<img src="../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)


<details>

<summary>Support HackTricks</summary>
Expand Down
3 changes: 1 addition & 2 deletions network-services-pentesting/8089-splunkd.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data
</details>
{% endhint %}


## **Basic Information**

* Log analytics tool used for data gathering, analysis, and visualization
Expand Down Expand Up @@ -148,4 +147,4 @@ Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.

</details>
{% endhint %}
{% endhint %}
3 changes: 1 addition & 2 deletions network-services-pentesting/pentesting-pop.md
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,6 @@ root@kali:~# telnet $ip 110
POP servers with the setting **`auth_debug`** enabled will be increasing the logs generated. However, if **`auth_debug_passwords`** or **`auth_verbose_passwords`** are set as **`true`**, password could be also logged in clear text in those logs.&#x20;
## HackTricks Automatic Commands
```
Expand Down Expand Up @@ -155,4 +154,4 @@ Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
</details>
{% endhint %}
{% endhint %}
3 changes: 1 addition & 2 deletions network-services-pentesting/pentesting-web/drupal/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,6 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from
Learn & practice AWS Hacking:<img src="../../../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../../../.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="../../../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../../../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)


<details>

<summary>Support HackTricks</summary>
Expand All @@ -135,4 +134,4 @@ Learn & practice GCP Hacking: <img src="../../../.gitbook/assets/grte.png" alt="
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.

</details>
{% endhint %}
{% endhint %}
Original file line number Diff line number Diff line change
Expand Up @@ -263,6 +263,7 @@ Thank you for taking the time to read this article, I hope it will help you get
Learn & practice AWS Hacking:<img src="../../../.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../../../.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="../../../.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="../../../.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)


<details>

<summary>Support HackTricks</summary>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -250,7 +250,6 @@ Check the XSLT page:
[xslt-server-side-injection-extensible-stylesheet-language-transformations.md](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
{% endcontent-ref %}


### References

* [https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/](https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/)
Expand All @@ -274,4 +273,4 @@ Learn & practice GCP Hacking: <img src="../.gitbook/assets/grte.png" alt="" data
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.

</details>
{% endhint %}
{% endhint %}

0 comments on commit a89f428

Please sign in to comment.