RedTeam
3.Web-Hacking
4.Injection
Parameter
Redirection

Top Injections

Type of vulnerability

  • Parameters Injection (directly after the parameter)
  • Payload Injection (directly after the URL)
  • Combination (Add payload after Parameters)

Type of parameter (List)

dest=      uri=     continue=  window=     redirect=     path=   url=       to= 
out=       view=    dir=       show=       navigation=   open=   file=     val= 
validate=  domain=  callback=  return=     page=         feed=   host= 
port=      next=    data=      reference=  site=         html=   returnurl=  ...

Parameters Vulnerability

https://website.com/vulnerable?url=POSSIBLY-VULNERABLE.com/EVIL-PATH

Encode URL Double Encode URL Use special characters (%E3%80%82%23 or 。# (Decoded)) https://example.com/x.php?url=EVIL-URL。#WEBSITE-URL (opens in a new tab)

Brute Force List and more special characters - https://github.com/ManShum812/VulnerabilityPayload/blob/main/openredirect.txt (opens in a new tab) - Search for 301 when brute forcing ---> Suggest to check them 1 by 1 (Some 200 response has worked before)