What's new

Closed How To Timpla(PAYLOAD)Keyword TUTORIAL

Status
Not open for further replies.

PHC - Naethan

Forum Expert
Joined
Dec 27, 2016
Posts
3,374
Reaction
18,119
Points
2,598
Age
22
HI MGA KA PHC!!

SHARE KO LNG TONG TRICKS NG PAGTITIMPLA NG TAMA AYUN SA RESPONSE REQUEST NG ISANG PAYLOAD HOPE IT'S HELP GUYS 😉

Supported Command on Payload

  • [netData] = CONNECT [host_port] [protocol]
  • [raw] = CONNECT [host_port] [protocol]
  • [real_raw] = CONNECT [host_port] [protocol][crlf][crlf]
  • [host] = Destination host
  • [port] = Destination port
  • [host_port] = Destination host and port, seperated by colon :
  • [ssh] = same as [host_port]
  • [protocol] = HTTP protocol version
  • [method] = default set is CONNECT
  • [cr] = Carriage Return, U+000D
  • [lf] = Line Feed, U+000A
  • \r = same as CR
  • \n = same as LF
  • #13 = same as CR
  • #10 = same as LF
  • [crlf] = CR (U+000D) followed by LF (U+000A)
  • [lfcr] = LF (U+000A) followed by CR (U+000D)
  • [crlf*1] = [crlf]
  • [crlf*2] = [crlf] [crlf] (until crlf*4)
  • [ua] = User Agent
  • [instant_split] = request 1 -> request 2
  • [split] = request 1 -> delay -> request 2
  • [delay_split] = request 1 -> more delay -> request 2
  • [repeat_split] = request 1 + request 1 -> request 2
  • [reverse_split] = request 1 + request 2 -> request 2
  • [split-x] = request 1 + request 2 -> delay -> request 2
  • [x-split] = request 1 + request 2 -> request 2
Method Payload
  • Normal = CONNECT [host_port] [protocol][crlf]Host: domain.com[crlf][crlf]
  • Front Inject = GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1[crlf]Host: domain.com[crlf][crlf]CONNECT [host_port] [protocol][crlf][crlf]
  • Back Inject = CONNECT [host_port] HTTP/1.1[crlf][crlf]GET You do not have permission to view the full content of this post. Log in or register now. [protocol][crlf]Host: domain.com[crlf][crlf]
  • Front Query = CONNECT domain.com@[host_port][crlf]GET You do not have permission to view the full content of this post. Log in or register now. [protocol][crlf]Host: domain.com[crlf][crlf]
  • Back Query = CONNECT [host_port]@domain.com[crlf]GET You do not have permission to view the full content of this post. Log in or register now. [protocol][crlf]Host: domain.com[crlf][crlf]
please explore the payload by yourself 🙂
images

©AnonYMoozze
 
Di lahat ng Payload Di maarte..
Tama ka jn paps..
Kala nila basta basta puwede ilagay sa config ang payload na maarte.. hehehe
Sa injector or kpn tunnel hindi maarte yan sa payload.. sa ovpn talaga medyo maselan yan sa payload..
 
Status
Not open for further replies.

Similar threads

Back
Top