test html 3 0924
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Comprehensive WAF Test</title>
</head>
<body>
<h1>WAF Vulnerability Test Page</h1>
<p>This page contains various payloads designed to test a WAF's ability to detect and block common attack vectors.</p>
<h2>XSS Payloads</h2>
<p>These examples test for cross-site scripting attacks.</p>
<div id="xss-div">
<p>1. Basic XSS: <script>alert('XSS Test 1');</script></p>
<p>2. Obfuscated XSS: <IMG SRC="jav%61script:alert('XSS Test 2');"></p>
<p>3. HTML Entity XSS: <script>alert('XSS Test 3');</script></p>
</div>
<hr>
<h2>SQL Injection Payloads</h2>
<p>These examples test for SQL injection attacks.</p>
<div id="sqli-div">
<p>1. Basic SQLi: ' OR 1=1--</p>
<p>2. Obfuscated SQLi: 1; %55NION%20%53ELECT%20null,null,null--</p>
<p>3. Case-manipulated SQLi: UNION SELECT NULL, NULL, NULL FROM users--</p>
</div>
<hr>
<h2>Command Injection & Path Traversal Payloads</h2>
<p>These examples test for command injection and path traversal attacks.</p>
<div id="command-div">
<p>1. Command Injection: & | ls -la</p>
<p>2. Path Traversal: ../../../etc/passwd</p>
</div>
</body>
</html>
まだコメントはありません。最初のコメントを書いてみませんか?
コメントを投稿するには、ログインする必要があります。