-
Notifications
You must be signed in to change notification settings - Fork 53
/
header.php
172 lines (152 loc) · 5.93 KB
/
header.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
<?php
if(!isset($_SESSION))
{
session_start();
}
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>BTS PenTesting Lab</title>
<link rel="stylesheet" href="/btslab/style.css" type="text/css" charset="utf-8" />
</head>
<body>
<div id="container" >
<div id="Menu">
<ul id="menu-bar" style="margin-left: auto ; margin-right: auto ;" >
<li class="current"><a href="/btslab">Home</a></li>
<li><a href="#">Vulnerability</a>
<ul><li><a href="#">A1- Injection</a>
<ul><li><a href="#">SQL Injection</a>
<ul>
<li><a href="/btslab/vulnerability/ForumPosts.php?id=1">Sql Injection 1</a></li>
<li><a href="/btslab/login.php">Authentication Bypass</a></li>
<li><a href="/btslab/vulnerability/sqli/UserInfo.php?id=1">Blind SQLi 1</a></li>
<li><a href="/btslab/vulnerability/sqli/blindsqli.php?id=1">Blind SQLi 2</a></li>
</ul>
</li>
<li>
<a href="/btslab/vulnerability/cmd/cmd.php">Command Injection </a>
</li>
<li><a href="#">PHP Code Injection</a>
<ul>
<li><a href="/btslab/vulnerability/phpinjection/challenge1.php?data=Hello">Challenge 1</a> </li>
<li><a href="/btslab/vulnerability/phpinjection/challenge2.php?data=Hello">Challenge 2</a> </li>
</ul>
</li>
<li><a href="#">PHP Object Injection</a>
<ul>
<?php
$a=array("Java","C","Perl");
$a1=array("Assembly","C","Perl");
$s=serialize($a);
$s1=serialize($a1);
?>
<a href='/btslab/vulnerability/injection/obj.php?array=<?php echo $s; ?>'>Challenge 1</a></li>
<li><a href='/btslab/vulnerability/injection/obj1.php?array=<?php echo $s1; ?>'>Challenge 2</a></li>
</ul>
</li>
<li><a href="/btslab/vulnerability/rfi/RFI.php?file=news.php">Remote File Inclusion</a></li>
<li>
<a href="/btslab/vulnerability/ssi/ssi.php">Server Side Includes(SSI) Injection</a>
</li>
</ul>
</li>
<li><a href="#">A3- XSS</a>
<ul>
<li><a href="#">Reflected(GET)</a>
<ul>
<li> <a href="/btslab/vulnerability/xss/xss1.php">Challenge 1</a></li>
<li> <a href="/btslab/vulnerability/xss/xss2.php">Challenge 2</a></li>
<li> <a href="/btslab/vulnerability/xss/xss3.php">Challenge 3</a></li>
<li> <a href="/btslab/vulnerability/xss/xss4.php">Challenge 4</a></li>
</ul>
</li>
<li><a href="/btslab/vulnerability/xss/postxss.php">POST Based</a></li>
<li><a href="/btslab/vulnerability/xss/dom.php">DOM based</a></li>
<li><a href="#">HTTP Referer</a>
<ul>
<li><a href="/btslab/vulnerability/xss/xss-referer2.php">Challenge 1</a></li>
<li><a href="/btslab/vulnerability/xss/xss-referer2.php">Challenge 2</a></li>
</ul>
</li>
<li><a href="/btslab/vulnerability/xss/xss-user-agent.php">User Agent Header</a></li>
<li><a href="#">Flash Based</a>
<ul>
<li><a href="/btslab/vulnerability/xss/flash/xss1.swf?vuln=/btslab">Challenge 1</a></li>
<li><a href="/btslab/vulnerability/xss/flash/exss.php">Challenge 2</a></li>
</ul>
<li><a href="/btslab/vulnerability/forum.php">Stored XSS(Persistent)</a></li>
</ul>
</li>
<li><a href="#">A4-Insecure Direct Object References</a>
<ul>
<li><a href="/btslab/myprofile.php?id=<?php if(isset($_SESSION['userid'])){ echo $_SESSION['userid'];} ?>" title="Make sure you have logged in ">Viewing Details</a>
</li>
<li><a href="/btslab/vulnerability/csrf/change-email.php" title="Make sure you have logged in ">Modifying email ID</a>
</li>
<li><a href="/btslab/vulnerability/dor/download.php?file=doc1.pdf">Download Document</a>
</li>
</ul>
</li>
<li><a href="#">A5-Security Misconfiguration</a>
<ul>
<li><a href="/btslab/setup.php">Setup Page not removed</a></li>
</ul>
</li>
<li>
<a href="/btslab/admin/adminlogin.php">A7- Missing Function Level Access Control</a>
</li>
<li><a href="#">A8- CSRF</a>
<ul>
<li><a href="/btslab/vulnerability/csrf/changeinfo.php">CSRF 1: Change Info</a></li>
<li><a href="/btslab/vulnerability/csrf/change-email.php">CSRF 2: Change Email</a></li>
</ul>
</li>
<li><a href="#">A10. Unvalidated Redirect & Forward..</a>
<ul>
<li><a href="/btslab/vulnerability/url/open.php?u=http://www.breakthesecurity.com">Open Redirect</a>
</li>
<li><a href="/btslab/vulnerability/url/forward.php?u=index.php">Open Forward</a>
</li>
</ul>
</li>
<li><a href="#">File Inclusion</a>
<ul>
<li><a href="/btslab/vulnerability/lfi/LFI.php?file=news.php">Local File Inclusion</a></li>
</ul>
</li>
<li><a href="#">More..</a>
<ul>
<li>
<a href="/btslab/vulnerability/ssrf/ssrf.php">SSRF</a>
</li>
<li>
<a href="/btslab/vulnerability/clickjacking/cj.php">Clickjacking</a>
</li>
<li>
<a href="/btslab/vulnerability/upload.php">Unrestricted File Upload</a>
</li>
</ul>
</li>
</ul></li>
<li><a href="/btslab/vulnerability/forum.php">Forum</a></li>
<?php if(!isset($_SESSION['isLoggedIn'])) {
echo "<li><a href='/btslab/login.php'>LogIn</a></li><li><a href='/btslab/register.php'>Register</a></li>";
}
else
{
echo "<li><a href='/btslab/logout.php'>LogOut</a></li>";
}
?>
<li><a href="/btslab/contact.php">Contact</a></li>
</ul>
</div>
<div id="Main-Container">
<br/>
<div id="logo">
<h1> BTS PenTesting Lab</h1>
</div>
<br/>
<div id="Main">