⚕️
Stuff
search
⌘Ctrlk
⚕️
Stuff
  • 🤝Greetings
  • 📘CTF writeups
    • TryHackMe
    • HackTheBox
    • SKR
    • 3108 CTF
    • EQCTF
    • UMCS CTF
    • BBCTF
  • 🕸️PortSwigger (Web Academy)
    • Prototype Pollution
      • Introduction
      • Client-Side Prototype Pollution
      • Prototype Pollution via API
      • Server-Side Prototype Pollution
        • Polluted Property Reflection
        • Status Code Override
        • Charset Override
        • JSON Spaces
        • Bypassing Input Filters
        • RCE via Vulnerable Requests
        • RCE via Methods
        • Lab 5 - Reflected
        • Lab 6 - Status Code & Charset
        • Lab 7 - Constructor Property
        • Lab 8 - JSON Spaces
        • Lab 9 - Vim Technique & B64
    • JWT
    • XSS
  • 📱Mobile Hacking Lab
    • Strings
  • ☠️Binary Exploitation
    • Stack
    • GDB Plugins
    • pwntools
  • 📰Cheatsheets & Article links
    • All Rounder
    • Web
    • Reverse Engineering
    • Active Directory
    • Linux
    • Binary Exploitation
    • Forensics
    • Intigriti-Monthly-Challenges
    • Miscellaneous / General
  • 🖼️LEKIR Framework writeups
    • Backdoor Exploiting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🕸️PortSwigger (Web Academy)chevron-right
  2. Prototype Pollution

Server-Side Prototype Pollution

Polluted Property Reflectionchevron-rightStatus Code Overridechevron-rightCharset Overridechevron-rightJSON Spaceschevron-rightBypassing Input Filterschevron-rightRCE via Vulnerable Requestschevron-rightRCE via Methodschevron-rightLab 5 - Reflectedchevron-rightLab 6 - Status Code & Charsetchevron-rightLab 7 - Constructor Propertychevron-rightLab 8 - JSON Spaceschevron-rightLab 9 - Vim Technique & B64chevron-right
PreviousLab 4chevron-leftNextPolluted Property Reflectionchevron-right

Last updated 9 months ago