Entendiendo la inyección XPath con ejemplos prácticos.

En este escrito aprenderás acerca de inyecciones Xpath e intentaré ser lo mas claro posible.

Qué es una inyección xpath?

XPath injection vulnerabilities arise when user-controllable data is incorporated into XPath queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Depending on the purpose for which the vulnerable query is being used…

--

--

--

Hola, Bienvenido a mi perfil de Medium! Soy Y000! 😊 ¿Quién soy? 🤔 Bueno… soy yo jaja soy solo un apasionado por la seguridad informatica.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
_Y000_

_Y000_

Hola, Bienvenido a mi perfil de Medium! Soy Y000! 😊 ¿Quién soy? 🤔 Bueno… soy yo jaja soy solo un apasionado por la seguridad informatica.

More from Medium

Accessing confidential files from a mobile phone in two minutes

XXE - TryHackMe Walkthrough

Burp Suite Lab — Exploiting XXE to perform SSRF attacks | WalkThrough

Gaining access to a network with Office macros — Pentesting and red teaming