Post Exploitation

Protocols that sometimes can be used:

  • jar://, ftp://, http://, or gopher://

You can use XML External Entities to

  • Information Disclosure

    • List files in the folders

    • Read file from the server

      • Reach for configuration and application files. Look for database / fileserver / backdoor credentials.

  • Remote Command Injection

  • Remote Command Execution

    • If application is written in PHP and has "Expect" module

  • SSRF

  • Denial of Service

Last updated