Web Application Obfuscation.pdf
1.5 MB
Web Application Obfuscation
‘-/WAFs..Evasion..Filters//alert
(/Obfuscation/)-’
Mario Heiderich
Eduardo Alberto Vela Nava
Gareth Heyes
David Lindsay
‘-/WAFs..Evasion..Filters//alert
(/Obfuscation/)-’
Mario Heiderich
Eduardo Alberto Vela Nava
Gareth Heyes
David Lindsay
❤1👍1
🔥MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
✅https://github.com/robotshell/magicRecon
✅https://github.com/robotshell/magicRecon
❤1
⚡Google Dorks - Cloud Storage: site:http://s3.amazonaws.com "target[.]com" site:http://blob.core.windows.net "target[.]com" site:http://googleapis.com "target[.]com" site:http://drive.google.com "target[.]com"
👉Find buckets and sensitive data.
Combine:
site:http://s3.amazonaws.com | site:http://blob.core.windows.net | site:http://googleapis.com | site:http://drive.google.com "target[.]com"
Add something to narrow the results: "confidential” “privileged" “not for public release”
✅Credit- Mike Takahashi
👉Find buckets and sensitive data.
Combine:
site:http://s3.amazonaws.com | site:http://blob.core.windows.net | site:http://googleapis.com | site:http://drive.google.com "target[.]com"
Add something to narrow the results: "confidential” “privileged" “not for public release”
✅Credit- Mike Takahashi
👍5👎2❤1👌1
❤4
❤2
💠 Web Recon : A Pentester's Guide to Information Gathering
🔗 https://hacklido.com/blog/968-web-recon-a-pentesters-guide-to-information-gathering
🔗 https://hacklido.com/blog/968-web-recon-a-pentesters-guide-to-information-gathering
HACKLIDO
Web Recon : A Pentester's Guide to Information Gathering
Information gathering or better called reconnaissance is the cornerstone of any Penetration Testing or Bug Bounty exercise. It is simply the act of colle...
❤1
💠 Directory Fuzzing and Hidden Resources: Using Ffuf Effectively
🔗 https://hacklido.com/blog/969-directory-fuzzing-and-hidden-resources-using-ffuf-effectively
🔗 https://hacklido.com/blog/969-directory-fuzzing-and-hidden-resources-using-ffuf-effectively
HACKLIDO
Directory Fuzzing and Hidden Resources: Using Ffuf Effectively
Directory fuzzing When browsing through web applications, there can be directories, or files, which are not visible when browsing through application...
❤1
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
McGraw.Hill.Gray.Hat.Hacking.2nd.EdSpunkins.pdf
12.6 MB
Gray Hat Hacking: The Ethical Hacker’s Handbook, Second Edition