2017-03-26 16:00:23 +00:00
# Bug Hunting Methodology and Enumeration
2018-04-23 19:22:11 +00:00
2018-08-12 21:30:22 +00:00
## Summary
* [Passive Recon ](#passive-recon )
* Shodan
* Wayback Machine
* The Harvester
* [Active Recon ](#active-recon )
2019-05-12 19:34:09 +00:00
* Masscan
2018-08-12 21:30:22 +00:00
* Nmap
* Nmap Script
* RPCClient
* Enum4all
* [List all the subdirectories and files ](#list-all-the-subdirectories-and-files )
* Gobuster
* Backup File Artifacts Checker
* [Web Vulnerabilities ](#looking-for-web-vulnerabilities )
* Repository Github
* Burp
* Web Checklist
* Nikto
* Payment functionality
2018-04-23 19:22:11 +00:00
2017-03-26 16:00:23 +00:00
## Passive recon
2018-08-12 21:30:22 +00:00
2017-05-17 18:40:45 +00:00
* Using Shodan (https://www.shodan.io/) to detect similar app
2018-08-12 21:30:22 +00:00
```bash
2018-03-23 12:53:53 +00:00
can be integrated with nmap (https://github.com/glennzw/shodan-hq-nse)
nmap --script shodan-hq.nse --script-args 'apikey=< yourShodanAPIKey > ,target=< hackme > '
```
2017-05-01 20:40:36 +00:00
2018-08-12 21:30:22 +00:00
* Using The Wayback Machine (https://archive.org/web/) to detect forgotten endpoints
```bash
2017-05-17 18:40:45 +00:00
look for JS files, old links
```
2017-05-01 20:40:36 +00:00
2017-05-17 18:40:45 +00:00
* Using The Harvester (https://github.com/laramies/theHarvester)
2018-08-12 21:30:22 +00:00
```python
2017-05-17 18:40:45 +00:00
python theHarvester.py -b all -d domain.com
```
2017-01-07 19:51:47 +00:00
2017-03-26 16:00:23 +00:00
## Active recon
2018-08-12 21:30:22 +00:00
2019-05-12 19:34:09 +00:00
* Masscan
```powershell
masscan -iL ips-online.txt --rate 10000 -p1-65535 --only-open -oL masscan.out
masscan -e tun0 -p1-65535,U:1-65535 10.10.10.97 --rate 1000
```
2017-05-17 18:40:45 +00:00
* Basic NMAP
2018-08-12 21:30:22 +00:00
2017-05-17 18:40:45 +00:00
```bash
sudo nmap -sSV -p- 192.168.0.1 -oA OUTPUTFILE -T4
sudo nmap -sSV -oA OUTPUTFILE -T4 -iL INPUTFILE.csv
• the flag -sSV defines the type of packet to send to the server and tells Nmap to try and determine any service on open ports
• the -p- tells Nmap to check all 65,535 ports (by default it will only check the most popular 1,000)
• 192.168.0.1 is the IP address to scan
• -oA OUTPUTFILE tells Nmap to output the findings in its three major formats at once using the filename "OUTPUTFILE"
• -iL INPUTFILE tells Nmap to use the provided file as inputs
```
2018-03-23 12:53:53 +00:00
* CTF NMAP
This configuration is enough to do a basic check for a CTF VM
2018-08-12 21:30:22 +00:00
2018-03-23 12:53:53 +00:00
```bash
nmap -sV -sC -oA ~/nmap-initial 192.168.1.1
-sV : Probe open ports to determine service/version info
-sC : to enable the script
-oA : to save the results
After this quick command you can add "-p-" to run a full scan while you work with the previous result
```
2017-05-17 18:40:45 +00:00
* Aggressive NMAP
2018-08-12 21:30:22 +00:00
2017-05-17 18:40:45 +00:00
```bash
nmap -A -T4 scanme.nmap.org
• -A: Enable OS detection, version detection, script scanning, and traceroute
• -T4: Defines the timing for the task (options are 0-5 and higher is faster)
```
* NMAP and add-ons
2018-08-12 21:30:22 +00:00
* Using searchsploit to detect vulnerable services
```bash
nmap -p- -sV -oX a.xml IP_ADDRESS; searchsploit --nmap a.xml
```
* Generating nice scan report
```bash
nmap -sV IP_ADDRESS -oX scan.xml & & xsltproc scan.xml -o "`date +%m%d%y`_report.html"
```
2017-05-01 20:40:36 +00:00
* NMAP Scripts
2018-08-12 21:30:22 +00:00
2017-05-17 18:40:45 +00:00
```bash
nmap -sC : equivalent to --script=default
nmap --script 'http-enum' -v web.xxxx.com -p80 -oN http-enum.nmap
PORT STATE SERVICE
80/tcp open http
| http-enum:
| /phpmyadmin/: phpMyAdmin
| /.git/HEAD: Git folder
| /css/: Potentially interesting directory w/ listing on 'apache/2.4.10 (debian)'
|_ /image/: Potentially interesting directory w/ listing on 'apache/2.4.10 (debian)'
nmap --script smb-enum-users.nse -p 445 [target host]
Host script results:
| smb-enum-users:
| METASPLOITABLE\backup (RID: 1068)
| Full name: backup
| Flags: Account disabled, Normal user account
| METASPLOITABLE\bin (RID: 1004)
| Full name: bin
| Flags: Account disabled, Normal user account
| METASPLOITABLE\msfadmin (RID: 3000)
| Full name: msfadmin,,,
| Flags: Normal user account
List Nmap scripts : ls /usr/share/nmap/scripts/
```
* RPCClient
2018-08-12 21:30:22 +00:00
2017-05-17 18:40:45 +00:00
```bash
╰─$ rpcclient -U "" [target host]
rpcclient $> querydominfo
2018-08-12 21:30:22 +00:00
Domain: WORKGROUP
Server: METASPLOITABLE
Comment: metasploitable server (Samba 3.0.20-Debian)
Total Users: 35
2017-05-17 18:40:45 +00:00
rpcclient $> enumdomusers
user:[games] rid:[0x3f2]
user:[nobody] rid:[0x1f5]
user:[bind] rid:[0x4ba]
```
2018-08-12 21:30:22 +00:00
2017-05-17 18:40:45 +00:00
* Enum4all
2018-08-12 21:30:22 +00:00
```bash
2017-05-17 18:40:45 +00:00
Usage: ./enum4linux.pl [options]ip
-U get userlist
-M get machine list*
-S get sharelist
-P get password policy information
-G get group and member list
-d be detailed, applies to -U and -S
-u user specify username to use (default “”)
-p pass specify password to use (default “”
-a Do all simple enumeration (-U -S -G -P -r -o -n -i).
-o Get OS information
-i Get printer information
==============================
| Users on XXX.XXX.XXX.XXX |
==============================
2018-08-12 21:30:22 +00:00
index: 0x1 Account: games Name: games Desc: (null)
index: 0x2 Account: nobody Name: nobody Desc: (null)
index: 0x3 Account: bind Name: (null) Desc: (null)
index: 0x4 Account: proxy Name: proxy Desc: (null)
index: 0x5 Account: syslog Name: (null) Desc: (null)
index: 0x6 Account: user Name: just a user,111,, Desc: (null)
index: 0x7 Account: www-data Name: www-data Desc: (null)
index: 0x8 Account: root Name: root Desc: (null)
2017-05-17 18:40:45 +00:00
```
2016-12-20 18:46:06 +00:00
2017-05-01 20:40:36 +00:00
## List all the subdirectories and files
* Using BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.
2018-08-12 21:30:22 +00:00
```bash
git clone https://github.com/mazen160/bfac
2017-05-01 20:40:36 +00:00
2018-08-12 21:30:22 +00:00
Check a single URL
bfac --url http://example.com/test.php --level 4
Check a list of URLs
bfac --list testing_list.txt
```
2017-05-01 20:40:36 +00:00
2017-03-26 16:00:23 +00:00
* Using DirBuster or GoBuster
2016-11-06 05:42:50 +00:00
2018-08-12 21:30:22 +00:00
```bash
./gobuster -u http://buffered.io/ -w words.txt -t 10
-u url
-w wordlist
-t threads
2016-12-20 18:46:06 +00:00
2018-08-12 21:30:22 +00:00
More subdomain :
./gobuster -m dns -w subdomains.txt -u google.com -i
gobuster -w wordlist -u URL -r -e
```
2016-11-06 05:42:50 +00:00
2017-03-26 16:00:23 +00:00
* Using a script to detect all phpinfo.php files in a range of IPs (CIDR can be found with a whois)
2018-08-12 21:30:22 +00:00
```bash
#!/bin/bash
for ipa in 98.13{6..9}.{0..255}.{0..255}; do
wget -t 1 -T 3 http://${ipa}/phpinfo.php; done &
```
2016-11-06 05:42:50 +00:00
2017-03-26 16:00:23 +00:00
* Using a script to detect all .htpasswd files in a range of IPs
2018-08-12 21:30:22 +00:00
```bash
#!/bin/bash
for ipa in 98.13{6..9}.{0..255}.{0..255}; do
wget -t 1 -T 3 http://${ipa}/.htpasswd; done &
```
2016-11-06 05:42:50 +00:00
2017-03-26 16:00:23 +00:00
## Looking for Web vulnerabilities
* Look for private information in GitHub repos with GitRob
2018-08-12 21:30:22 +00:00
```bash
git clone https://github.com/michenriksen/gitrob.git
gitrob analyze johndoe --site=https://github.acme.com --endpoint=https://github.acme.com/api/v3 --access-tokens=token1,token2
```
2017-01-07 19:51:47 +00:00
2016-12-20 18:46:06 +00:00
* Explore the website with a proxy (ZAP/Burp Suite)
2018-08-12 21:30:22 +00:00
1. Start proxy, visit the main target site and perform a Forced Browse to discover files and directories
2. Map technologies used with Wappalyzer and Burp Suite (or ZAP) proxy
3. Explore and understand available functionality, noting areas that correspond to vulnerability types
2017-05-01 20:40:36 +00:00
2018-08-12 21:30:22 +00:00
```bash
Burp Proxy configuration on port 8080 (in .bashrc):
alias set_proxy_burp='gsettings set org.gnome.system.proxy.http host "http://localhost";gsettings set org.gnome.system.proxy.http port 8080;gsettings set org.gnome.system.proxy mode "manual"'
alias set_proxy_normal='gsettings set org.gnome.system.proxy mode "none"'
2016-11-06 05:42:50 +00:00
2018-08-12 21:30:22 +00:00
then launch Burp with : java -jar burpsuite_free_v*.jar &
```
* [Checklist for Web vulns ](http://mdsec.net/wahh/tasks.html )
2017-03-26 18:51:40 +00:00
2016-12-20 18:46:06 +00:00
* Subscribe to the site and pay for the additional functionality to test
* Launch a Nikto scan in case you missed something
2018-08-12 21:30:22 +00:00
```powershell
2018-04-23 16:41:59 +00:00
nikto -h http://domain.example.com
```
* Payment functionality - [@gwendallecoguic ](https://twitter.com/gwendallecoguic/status/988138794686779392 )
> if the webapp you're testing uses an external payment gateway, check the doc to find the test credit numbers, purchase something and if the webapp didn't disable the test mode, it will be free
2018-04-23 16:44:49 +00:00
2018-04-23 16:41:59 +00:00
From https://stripe.com/docs/testing#cards : "Use any of the following test card numbers, a valid expiration date in the future, and any random CVC number, to create a successful payment. Each test card's billing country is set to U.S. "
e.g :
2018-04-23 18:45:54 +00:00
2018-04-23 18:55:26 +00:00
Test card numbers and tokens
2018-04-23 19:22:11 +00:00
2018-04-23 18:45:54 +00:00
| NUMBER | BRAND | TOKEN |
| :------------- | :------------- | :------------- |
| 4242424242424242 | Visa | tok_visa |
| 4000056655665556 | Visa (debit) | tok_visa_debit |
| 5555555555554444 | Mastercard | tok_mastercard |
2018-04-23 18:55:26 +00:00
International test card numbers and tokens
2018-04-23 18:45:54 +00:00
| NUMBER | TOKEN | COUNTRY | BRAND |
| :------------- | :------------- | :------------- | :------------- |
| 4000000400000008 | tok_at | Austria (AT) | Visa |
| 4000000560000004 | tok_be | Belgium (BE) | Visa |
| 4000002080000001 | tok_dk | Denmark (DK) | Visa |
| 4000002460000001 | tok_fi | Finland (FI) | Visa |
| 4000002500000003 | tok_fr | France (FR) | Visa |
2018-12-24 14:02:50 +00:00
## References
2018-08-12 21:30:22 +00:00
* [[BugBounty] Yahoo phpinfo.php disclosure - Patrik Fehrenbach](http://blog.it-securityguard.com/bugbounty-yahoo-phpinfo-php-disclosure-2/)
* [Nmap CheatSheet - HackerTarget ](https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/ )