Comment on page
Web Cache Poisoning
Web cache poisoning is an advanced technique whereby an attacker exploits the behavior of a web server and cache so that a harmful HTTP response is served to other users.
Fundamentally, web cache poisoning involves two phases. First, the attacker must work out how to elicit a response from the back-end server that inadvertently contains some kind of dangerous payload. Once successful, they need to make sure that their response is cached and subsequently served to the intended victims.
wcvs -u https://url.com
python3 arjun.py -u https://url.com --get
python3 arjun.py -u https://url.com --post
python parameth.py -u https://example.com/test.php
python3 paramspider.py --domain example.com
python3 parth.py -t example.com
# XSS for users accessing /en?region=uk:
GET /en?region=uk HTTP/1.1
Last modified 1yr ago