Methodology
Obfuscating attacks using encoding
Obfuscation via URL encoding
[...]/?search=Fish+%26+ChipsObfuscation via double URL encoding
[...]/?search=%253Cimg%2520src%253Dx%2520onerror%253Dalert(1)%253EObfuscation via HTML encoding
<img src=x onerror="alert(1)">
<a href="javascript:alert(1)">Click me</a>Obfuscation via XML encoding
<stockCheck>
<productId>
123
</productId>
<storeId>
999 SELECT * FROM information_schema.tables
</storeId>
</stockCheck>Obfuscation via unicode escaping
Obfuscation via hex escaping
Obfuscation via octal escaping
Obfuscation via multiple encodings
Obfuscation via the SQL CHAR() function
Using Burp Scanner during manual testing
Scanning a specific request
Lab: Discovering vulnerabilities quickly with targeted scanning




Scanning custom insertion points
Scanning non-standard data structures





Last updated