Skip to content

Conversation

@SolomonSklash
Copy link
Contributor

No description provided.

* [XXE Cheatsheet – XML External Entity Injection](https://www.gracefulsecurity.com/xxe-cheatsheet/)
* [Generic XXE Detection](http://christian-schneider.net/GenericXxeDetection.html#main)
* [Exploitation: XML External Entity (XXE) Injection](https://depthsecurity.com/blog/exploitation-xml-external-entity-xxe-injection)
* [Payload All The Things XXE](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20injection)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is also already listed.

* [Security Implications of DTD Attacks Against a Wide Range of XML Parsers](https://www.nds.rub.de/media/nds/arbeiten/2015/11/04/spaeth-dtd_attacks.pdf)
* [XXE Cheatsheet – XML External Entity Injection](https://www.gracefulsecurity.com/xxe-cheatsheet/)
* [Generic XXE Detection](http://christian-schneider.net/GenericXxeDetection.html#main)
* [Exploitation: XML External Entity (XXE) Injection](https://depthsecurity.com/blog/exploitation-xml-external-entity-xxe-injection)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Basic information about XXE is alread covered in learning section

* [DTD Cheat Sheet](https://web-in-security.blogspot.com/2016/03/xxe-cheat-sheet.html)
* [Security Implications of DTD Attacks Against a Wide Range of XML Parsers](https://www.nds.rub.de/media/nds/arbeiten/2015/11/04/spaeth-dtd_attacks.pdf)
* [XXE Cheatsheet – XML External Entity Injection](https://www.gracefulsecurity.com/xxe-cheatsheet/)
* [Generic XXE Detection](http://christian-schneider.net/GenericXxeDetection.html#main)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is already listed.

* [XML Security Cheat Sheet - OWASP](https://www.owasp.org/index.php/XML_Security_Cheat_Sheet)
* [XML Parser Evaluation ](https://web-in-security.blogspot.com/2016/03/xml-parser-evaluation.html)
* [DTD Cheat Sheet](https://web-in-security.blogspot.com/2016/03/xxe-cheat-sheet.html)
* [Security Implications of DTD Attacks Against a Wide Range of XML Parsers](https://www.nds.rub.de/media/nds/arbeiten/2015/11/04/spaeth-dtd_attacks.pdf)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Surely can be added.

* [XPATH Injection - OWASP](https://www.owasp.org/index.php/XPATH_Injection)
* [Top 10-2017 A4-XML External Entities (XXE) - OWASP](https://www.owasp.org/index.php/Top_10-2017_A4-XML_External_Entities_(XXE))
* [XML Security Cheat Sheet - OWASP](https://www.owasp.org/index.php/XML_Security_Cheat_Sheet)
* [XML Parser Evaluation ](https://web-in-security.blogspot.com/2016/03/xml-parser-evaluation.html)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Surely can be added.

@exploitprotocol
Copy link
Owner

Hey @bellma101 ,

Extremely sorry for the late reply.

First of all thanks a lot for sending us this pull request. I have checked nearly every link, some of them are already existing on the wiki and some of them have the same concept which are mentioned in the other links. Main aim of this wiki is to solve duplicacy of information issue.

But surely there are some really good links, i made comments on each of them , please have a look.

You can create a new pull request or even i can commits these links with full credits given to you.
Thanks a lot again for your help! Keep up the good work 👍

@exploitprotocol
Copy link
Owner

Also i forgot to mention, we cannot remove whitespace from markdown below headings, because doing that somehow breaks rendering of text.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants