Autoplay
Autocomplete
Previous Lesson
Complete and Continue
XXE Injection
Introduction
Course Introduction (2:06)
Course Slides and Scripts
Getting Help
Answering Your Questions (3:11)
Join the Discord Server
XXE Injection - Technical Deep Dive
Agenda (0:54)
What is XXE Injection (22:53)
How to Find XXE Injection (6:13)
How to Exploit XXE Injection (14:44)
How to Prevent XXE Injection (1:20)
Additional Resources (1:34)
Lab Environment Setup
Lab Environment Setup (7:21)
Step-by-Step Guide
Hands-On XXE Injection Labs
Lab #1 Exploiting XXE using external entities to retrieve files (10:28)
Lab #2 Exploiting XXE to perform SSRF attacks (11:33)
Note - Changes to Burp Collaborator
Lab #3 Blind XXE with out-of-band interaction (5:53)
Lab #4 Blind XXE with out-of-band interaction via XML parameter entities (6:35)
Lab #5 Exploiting blind XXE to exfiltrate data using a malicious external DTD (16:54)
Lab #6 Exploiting blind XXE to retrieve data via error messages (12:14)
Lab #7 Exploiting XInclude to retrieve files (12:41)
Lab #8 Exploiting XXE via image file upload (23:48)
Lab #9 Exploiting XXE to retrieve data by repurposing a local DTD (23:51)
Thank You!
Thank You!
Join the Discord Server
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock