![]() The results of this are now included in my payloads project on Github ( ).Ĭollecting these request payloads involved a few basic steps. For the purposes of this post the focus is collecting only the HTTP GET requests from CTF PCAP files. ![]() ![]() So the quality of the payloads can range from plain noise to a well crafted exploit. In a CTF event there can be participants of different skill and experience levels competing to solve numerous challenges. Another good source of interesting payloads comes from packet capture (PCAP) files from Capture the Flag (CTF) events. In my last post, Collecting XSS Subreddit Payloads, I touched on the usefulness of collecting payloads from various sources.
0 Comments
Leave a Reply. |