Common Parameters#
I found a project called top25-parameter that lists some commonly used parameters for exploiting common vulnerabilities and extends them:
Top 25 XSS parameters:
Top 25 SSRF parameters:
Top 25 LFI parameters:
Top 25 SQL injection parameters:
Top 25 command execution parameters:
Top 25 open redirect parameters:
How to Apply#
In practice, these parameters can be used by collecting the parameters from the URLs of the target domain/IP. For example, if the URL is http://www.xx.com/index.php?id=1, you can directly filter out the id parameter, which may have an SQL injection vulnerability. Parameters following the ? have a high probability of being unfiltered and can be controlled.
The program used is gf, https://github.com/tomnomnom/gf.
- Compile
gfusing Go:
- After compilation, load the JSON configuration file. Below is an example configuration file for RCE:
With the JSON file, you can filter out the parameters when testing the URL. For example, if there is a URL like http://xxx.com/index.php?cmd=ls, you can filter it out using the JSON script that contains the RCE parameters.
- Now you need to configure
gfto automatically recognize the JSON scripts placed in~/.gffolder. Press the tab key to automatically complete the JSON file. The listed files are all JSON files:

-
After the configuration is complete, you can use the
gfcommand followed by the tab key to automatically load the JSON files. -
To collect URLs, there are many methods, usually in a batch manner. First, collect all the domain names and subdomains, and then collect the parameters from the URLs.
The following applications can be used to collect URLs:
The scanning process is quite simple.
Here is an example using Gf-Patterns: