Skip to content

Latest commit

 

History

History
54 lines (29 loc) · 4.28 KB

File metadata and controls

54 lines (29 loc) · 4.28 KB

Oracle CTF Web XML Entity Exploit

Donate using Liberapay

Overview:

As can be seen in the following request / response example, the xml entity expansion attack can be performed, and this attack can send requests that exceed the existing memory and processor capacities, causing memory bottlenecks and preventing the service from running. 10kb more request is returned.

Download

Cloning an Existing Repository ( Clone with HTTPS )

root@slife:~# git clone https://github.com/omurugur/Oracle_CTF_Web_XML_Entity_Exploit.git
Cloning an Existing Repository ( Clone with SSH )

root@slife:~# git clone git@github.com:omurugur/Oracle_CTF_Web_XML_Entity_Exploit.git

Contact

Mail : omurugur12@gmail.com
Donate!

Support the authors: