Back to blog
Apr 08, 2026
2 min read
...

XXE Injection

Exploiting XML External Entities.

Jr Web Application Pentesting > Injection Attacks > XXE Injection

ORM Injection

Task 1

Introduction

  1. Deploy the target VM attached to this task by pressing the green Start Machine button. After obtaining the machine’s generated IP address, you can either use the AttackBox or your own VM connected to TryHackMe’s VPN.

After 3 minutes, visit http://MACHINE_IP to access the machine.

No answer needed

Task 2

Exploring XML

  1. What is the meaning of the acronym SGML?
Standard Generalized Markup Language
  1. What is the meaning of the acronym DTD?
Document Type Definition

Task 3

XML Parsing Mechanisms

  1. What XML parser builds the entire XML document into a memory-based tree structure, allowing random access to all parts of the document?
DOM Parser

Task 4

Exploiting XXE - In-Band

  1. What XXE vulnerability occurs when the server’s response is immediately disclosed to the attacker without the use of external channels?
In-Band XXE
  1. What is the content of the file 14232d6db2b5fd937aa92e8b3c48d958.txt in the /opt directory?
THM{1N_b4Nd_1$_34sYY}

Task 5

Exploiting XXE - Out-of-Band

  1. What kind of XXE vulnerability occurs when the response of the server is not visible to the attacker?
Out-of-Band XXE

Task 6

SSRF + XXE

  1. What is the flag in the application running internally?
THM{0O8_xx3!!}
  1. What port is the internal application hosted on?
81

Task 7

Mitigation

  1. Click me to proceed to the next task.
No answer needed

Task 8

Conclusion

  1. I can now exploit XXE vulnerabilities!
No answer needed

¿Te resultó útil este contenido?

Compártelo con otros desarrolladores que puedan encontrarlo interesante

Comentarios