Hacksplaining
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance
Sign Up
Log In
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance Sign Up Log In

XML External Entities

During parsing, it expands out the external entity reference, and includes the local user information file, just as Mal hoped. The first part of the trap is sprung.

The hacker executing his attack.
The login page for a social network
Lessons
Glossary
Terms and Conditions
Privacy Policy

© 2026 Hacksplaining Inc. All rights reserved. Questions? Email us at support@hacksplaining.com