Skip to content

Files

Latest commit

 

History

History
62 lines (49 loc) · 1.96 KB

php-grep-payloads.md

File metadata and controls

62 lines (49 loc) · 1.96 KB
description
If the source code gets leaky, dig through the spaghetti a little.

Code Analysis : PHP & grep

PHP Vulnerabilities could fill a library and will likely continue to fill evermore through the years of this language's livelihood on the web. If you do get a chance to see the source code of a web app; be it open-source on github, a white-box test or just a poorly implemented leaky framework, here are some golden nuggets to grep for.

XSS:
grep -Ri "echo" .
grep -Ri "$_" . | grep "echo"
grep -Ri "$_GET" . | grep "echo"
grep -Ri "$_POST" . | grep "echo"
grep -Ri "$_REQUEST" . | grep "echo"

Command execution:
grep -Ri "shell_exec(" .
grep -Ri "system(" .
grep -Ri "exec(" .
grep -Ri "popen(" .
grep -Ri "passthru(" .
grep -Ri "proc_open(" .
grep -Ri "pcntl_exec(" .

Code execution:
grep -Ri "eval(" .
grep -Ri "assert(" .
grep -Ri "preg_replace" . | grep "/e"
grep -Ri "create_function(" .

SQL Injection:
grep -Ri "$sql" .
grep -Ri "$sql" . | grep "$_"

SQLMAP Cheatsheet for WordPress:
sqlmap -u "http://target.tld/?paramater=1" -p "parameter" --technique=B --dbms=mysql --suffix=")--" --string="Test" --sql-query="select user_login,user_pass from wp_users"

Information leak via phpinfo:
grep -Ri "phpinfo" .

Find dev and debug modes:
grep -Ri "debug" .
grep -Ri "$_GET['debug']" .
grep -Ri "$_GET['test']" .

RFI/LFI:
grep -Ri "file_include" .
grep -Ri "include(" .
grep -Ri "require(" .
grep -Ri "require($file)" .
grep -Ri "include_once(" .
grep -Ri "require_once(" .
grep -Ri "require_once(" . | grep "$_"

Misc:
grep -Ri "header(" . | grep "$_"
grep -Ri '$_SERVER["HTTP_USER_AGENT"]' .

Path Traversal:
grep -Ri file_get_contents .
RATS Auditing tool for C, C++, Perl, PHP and Python