Which of the following is used for banner grabbing?
Anonymous Quiz
48%
Telnet
12%
FTP
19%
SSH
21%
Wireshark
π1
π¨OneDorkForAllπ¨
πAn insane list of all dorks taken from everywhere from various different sources. Google, Shodan, Github. Bug bounty dorks (includes private programs), shodan, github, CCTV, CMS dorks, lfi, sqli, xss, more vulns + an extra 1Mil+ dorks.
πhttps://github.com/HackShiv/OneDorkForAll
πAn insane list of all dorks taken from everywhere from various different sources. Google, Shodan, Github. Bug bounty dorks (includes private programs), shodan, github, CCTV, CMS dorks, lfi, sqli, xss, more vulns + an extra 1Mil+ dorks.
πhttps://github.com/HackShiv/OneDorkForAll
π₯7π«‘2β€1π€1
π¨X-Recon: A utility for detecting webpage inputs and conducting XSS scans.π¨
Features:
1. Subdomain Discovery
2. Site-wide Link Discovery
3. Form and Input Extraction
4. XSS Scanning
πLink: https://lnkd.in/gfAeBPz7
Features:
1. Subdomain Discovery
2. Site-wide Link Discovery
3. Form and Input Extraction
4. XSS Scanning
πLink: https://lnkd.in/gfAeBPz7
π―4π2π₯1
This media is not supported in your browser
VIEW IN TELEGRAM
π¨noWAFplsπ¨
πBurp Plugin to Bypass WAFs through the insertion of Junk Data
π https://github.com/assetnote/nowafpls
πBurp Plugin to Bypass WAFs through the insertion of Junk Data
π https://github.com/assetnote/nowafpls
π3π₯1π€―1
π¨CVE-2024-23692: Unauthenticated RCE Flaw in Rejetto HTTP File Server
πIt allows remote attackers to execute arbitrary code on affected servers without authentication, potentially leading to data breaches, ransomware attacks, and complete system compromise.
π₯PoC: https://github.com/rapid7/metasploit-framework/pull/19240
π₯Dorks:
Hunter: /product.name="HTTP File Server" and web.body="Rejetto"
FOFA: product="HFS"
SHODAN: product:"HttpFileServer httpd"
#Rejetto #HFS #bugbounty #bugbountytips #cybersecurity #pentesting
πIt allows remote attackers to execute arbitrary code on affected servers without authentication, potentially leading to data breaches, ransomware attacks, and complete system compromise.
π₯PoC: https://github.com/rapid7/metasploit-framework/pull/19240
π₯Dorks:
Hunter: /product.name="HTTP File Server" and web.body="Rejetto"
FOFA: product="HFS"
SHODAN: product:"HttpFileServer httpd"
#Rejetto #HFS #bugbounty #bugbountytips #cybersecurity #pentesting
π₯2
This media is not supported in your browser
VIEW IN TELEGRAM
Found this on twitter. The POC is very informative. What you think?
π₯11π2π€―2
Surprisingly Havij - SQL injection tool helped me to achieve a error based sqli on ferrari π³
π³4
Simple but effective method to narrow down your scope, sometimes it helps to think simple.
waybackurls --dates domain(.)com | grep '?id='
Payload : if(now()=sysdate(),SLEEP(8),0)
By:@ynsmroztas
#bugbountytips #bugbounty
waybackurls --dates domain(.)com | grep '?id='
Payload : if(now()=sysdate(),SLEEP(8),0)
By:@ynsmroztas
#bugbountytips #bugbounty
π₯6π1
Brut Security
π¨CVE-2024-23692: Unauthenticated RCE Flaw in Rejetto HTTP File Server πIt allows remote attackers to execute arbitrary code on affected servers without authentication, potentially leading to data breaches, ransomware attacks, and complete system compromise.β¦
Media is too big
VIEW IN TELEGRAM
Rejetto HTTP File Server - Template injection
π₯5
π¨CVE-2024-29849~29852: Veeamβs Backup Nightmare, Full System Access Exposed
β Veeam Backup Enterprise Manager has been issued 4 critical vulnerabilities, allowing unauthorized access, account takeover, and data exposure.
π₯PoC: https://github.com/sinsinology/CVE-2024-29849
π₯Dorks:
Hunter:/product.name="Veeam Backup Enterprise Manager"
FOFA:app="Veeam-Backup-Enterprise-Manager"
SHODAN:http.title:"Veeam Backup Enterprise Manager"
#Veeam #backup #infosec #infosecurity #Infosys #Vulnerability #bugbounty #bugbountytips
β Veeam Backup Enterprise Manager has been issued 4 critical vulnerabilities, allowing unauthorized access, account takeover, and data exposure.
π₯PoC: https://github.com/sinsinology/CVE-2024-29849
π₯Dorks:
Hunter:/product.name="Veeam Backup Enterprise Manager"
FOFA:app="Veeam-Backup-Enterprise-Manager"
SHODAN:http.title:"Veeam Backup Enterprise Manager"
#Veeam #backup #infosec #infosecurity #Infosys #Vulnerability #bugbounty #bugbountytips
π€―3