Web


Discovery Tool

Some ressources are accessible by the attacker but not referenced by the web application. Discovery tool bruteforce url or domain with wordlist to discover new content.

Wordlist

Name
Path

SecLists Raft Medium

/usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt

SecList DNS

/usr/share/seclists/Discovery/DNS/namelist.txt

Dirbuster Small

/usr/share/wordlists/dirbuster/directory-list-2.3-small.txt

Dirbuster Small Lowercase

/usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-small.txt

Dirb

/usr/share/dirb/wordlists/common.txt

Extensions

Type
Extension

Script

php,js,twig

Text

html,txt,md

Data

json,csv

DB

db,sqlite

Linux

sh,bin

Windows

ps1,exe

Cewl

A tool to create a wordlist from a site.

ffuf

Most Popular domain discovery command

Gobuster

Feroxbuster

(Best one)

Dirb

GUI

Nosql Injection

NoSQL databases (aka "not only SQL") are non-tabular databases and store data differently than relational tables. The syntax is different from traditional SQL syntax. Example: Mongo

Common Pattern

Form

JSON

SQL Injection

SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. - Source

Interesting cheat sheet of Port Swigger.

Manual

Common pattern

Comment

INSERT

Separator

Interesting postgres function

Filter bypass

Arbitrary read / write

SQLmap

SQLmap is a tool that automates the process of detecting and exploiting SQL injection.

SQLmap Usage

Discovery

Get DB

List Privileges

File

Shell

Optimize

Turbo SQLmap

Path traversal (LFI)

A path traversal attack aims to access files and directories that are stored outside the web root folder by manipulating variables that reference files. It may be possible to access arbitrary files and directories including application source code or configuration and critical system files.

Pattern

Try to add %00 at the end of your payload.

PHP pattern

SSTI

Template engines are widely used by web applications to present dynamic data via web pages and emails. Unsafely embedding user input in templates enables Server-Side Template Injection. Template Injection can be used to directly attack web servers' internals and often obtain Remote Code Execution (RCE). source

Test

Nunchucks (Nodejs)

Python (Jinja2)

Golang

XML external entity (XXE)

XML external entity (XXE) injection is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. - source

Read File

XSS Injection

XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. source

Script

Meta

Object

Server Side XSS

Server XSS occurs when untrusted user supplied data is included in an HTTP response generated by the server. In this case, the entire vulnerability is in server-side code, and the browser is simply rendering the response and executing any valid script embedded in it. source

Dynamic PDF

Extract annotation

You can extract annotation files with this script:

Cookies

Cookies can be hijack by different way. Sign cookies can be decode to find vulnerable informations or bruteforce to find secret in order to create your own cookies. Other type of cookies need to be steal to hijack session.

Flask

Flask cookies are sign cookie so you can decode it or bruteforce the secret.

Decode

Bruteforce

Encode

Json Web Token (JWT)

A JWT comes in this structure: AAAAAA.BBBBBB.CCCCCC. AAAAAA represents the header, BBBBBB represents the payload while CCCCCC represents the signature.

The most common algorithms for signing JWTs are:

  • HMAC + SHA256 (HS256)

  • RSASSA-PKCS1-v1_5 + SHA256 (RS256)

  • ECDSA + P-256 + SHA256 ( ES256)

Source

Encode / Decode

Brute Force

Request

Different tool to make a http request.

Curl

Python

Javascript

Download .git

Source

Source

CMS

Scaning

Certificate

PhpMyAdmin

Quick Shellcode

Last updated