#Beacon
1.19K subscribers
272 photos
26 videos
130 files
1.83K links
Прожаренный цуберпохек

[educational channel/white hat only] - do not try the knowledge from here on your home or other people's microwaves
Download Telegram
Dir Brute

assetfinder $target | sed 's#*.# #g' | httpx -silent -threads 10 | xargs -I@ sh -c 'gobuster dir -w /path/to/file -u @ -s 200 -t 150 -H "X-Forwarded-For:127.0.0.1"'


cat hosts | xargs -I@ sh -c 'python3 http://dirsearch.py -r -b -w path -u @ -e php,html,json,aspx'
/endpoints finder

echo "http://api.uber.com" | waybackurls | cut -d "/" -f 4,5 | sed 's/?.*//' | sort -u
SSRF finder

assetfinder -t DOMAIN -q | httpx -silent -threads 1000 | gau |  grep "=" | qsreplace http://YOUR.burpcollaborator.net
Sensetive in JS files

xargs -a urls.txt -I@ sh -c 'python3 http://SecretFinder.py -i @ -o cli -o '


xargs -a domains -I@ sh -c 'gau @ |grep -iE '\.js'|grep -ivE '\.json'|sort -u >> JS.txt' ; xargs -a JS.txt -n2 -I@ sh -c 'echo -e "\n[URL] @\n"; python3 linkfinder.py -i @ ' >> Url.txt


rush -i urls.txt 'python3 http://SecretFinder.py -i {} -o cli'
XSS WINGMAN

xargs -a domain -I@ sh -c 'wingman -u @ --crawl | notify'
XSS

cat subdomains.txt | waybackurls >> wayback.txt
cat subdomains.txt | hakrawler -depth 3 -plain >> spider.txt
cat spider.txt wayback.txt | kxss
GIT search

xargs -a file.txt -P10 -I@ sh -c 'goop @ | grep 200'
> kubectl get secrets

> kubectl get secret {mysecret} -o json | jq '.data'

{
"api-key": "c2VjcmV0LWFwaS1rZXk=",
"password": "c2VjcmV0LXBhc3N3b3Jk"
}

You need the the eks:DescribeCluster and eks:ListClusters AWS Identity and Access Management (IAM) policy, which allows you to list all of the Amazon EKS clusters in your AWS account.

AWS Policy example

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"eks:DescribeCluster",
"eks:ListClusters"
],
"Resource": "*"
}
]
}

> aws eks list-clusters
> aws eks update-kubeconfig --name {name}

> gcloud container clusters list
> gcloud container clusters get-credentials <CLUSTER_NAME>

> az aks list
> az group list
> az aks get-credentials --name <CLUSTER_NAME> --resource-group <RESOURCE_GROUP_NAME>




#kubernetes
Find Subdomains TakeOver

#subdomains #subs #ato

subfinder -d {target} >> domains ; assetfinder -subs-only {target} >> domains ; amass enum -norecursive -noalts -d {target} >> domains ; subjack -w domains -t 100 -timeout 30 -ssl -c ~/go/src/github.com/haccer/subjack/fingerprints.json -v 3 >> takeover ;
1. Информационная безопасность
2. Тестирование процесса безопасности
3. Тестирование технологии веб-безопасности
4. Тестирование безопасности каналов связи
5. Тестирование безопасности беспроводных технологий
6. Тестирование физической безопасности