You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Request file is just valid HTTP request with XML somewhere (parameter,
whole body, etc.). If XML is already in the request file then tool
automatically detects it and injects DTD to exploit vulnerability. You can
also specify XXEINJECT mark where DTD should be injected and tool will
replace it with proper payload. If you want to manually put DTD in request
file and you do not want to automatically detect and inject payload then
you need to specify --nodtd argument. Please note that if you put DTD
manually then it needs to be specified correctly. You can run tool with
--dtd argument to see how DTD should look like.
Sample request file where tool injects payload automatically:
POST /xxe.php HTTP/1.1
Host: asd
xml=
Sample request file where tool will inject DTD in specified place:
POST /xxe.php HTTP/1.1
Host: asd
xml=XXEINJECT
Sample request file with payload manually injected according to --dtd. You
need to specify --nodtd as parameter to disable automatic payload injection:
Hi there!! I am mew in XXE. I just want to know what should I put in that req.txt file Captured HTTP Requests or anything else.
The text was updated successfully, but these errors were encountered: