hacktricks/pentesting-web/web-vulnerabilities-methodology.md

153 lines
8.8 KiB
Markdown
Raw Normal View History

# Mbinu za Kutambua Mapungufu kwenye Wavuti
2024-04-06 19:39:38 +00:00
<details>
<summary><strong>Jifunze kuhusu kudukua AWS kutoka mwanzo hadi mtaalamu na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalamu wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2024-04-06 19:39:38 +00:00
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA USAJILI**](https://github.com/sponsors/carlospolop)!
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2024-04-06 19:39:38 +00:00
</details>
Katika kila Pentest ya Wavuti, kuna **maeneo mengi yaliyofichwa na dhahiri ambayo yanaweza kuwa na mapungufu**. Chapisho hili linakusudiwa kuwa orodha ya kuhakikisha kuwa umetafuta mapungufu katika maeneo yote yanayowezekana.
2024-04-06 19:39:38 +00:00
## Proxies
{% hint style="info" %}
Leo hii **maombi ya wavuti** kawaida **hutumia** aina fulani ya **proxies za kati**, ambazo zinaweza kutumiwa kudukua mapungufu. Mapungufu haya yanahitaji kuwepo kwa proxy dhaifu, lakini kawaida pia yanahitaji mapungufu ya ziada kwenye seva ya nyuma.
2024-04-06 19:39:38 +00:00
{% endhint %}
* [ ] [**Kudukua vichwa vya hop-kwa-hop**](abusing-hop-by-hop-headers.md)
* [ ] [**Udanganyifu wa Cache/Cache Deception**](cache-deception.md)
* [ ] [**Kudukua Maombi ya HTTP**](http-request-smuggling/)
2024-04-06 19:39:38 +00:00
* [ ] [**H2C Smuggling**](h2c-smuggling.md)
* [ ] [**Uingizaji wa Upande wa Seva/Uingizaji wa Upande wa Edge**](server-side-inclusion-edge-side-inclusion-injection.md)
* [ ] [**Kufunua Cloudflare**](../network-services-pentesting/pentesting-web/uncovering-cloudflare.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Upande wa Seva wa XSLT**](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
* [ ] [**Kudukua Kinga ya Proxy / WAF**](proxy-waf-protections-bypass.md)
2024-04-06 19:39:38 +00:00
## **Mnong'ono wa Mtumiaji**
2024-04-06 19:39:38 +00:00
{% hint style="info" %}
Zaidi ya maombi ya wavuti **itawaruhusu watumiaji kuingiza baadhi ya data ambayo itashughulikiwa baadaye.**\
Kulingana na muundo wa data ambayo seva inatarajia, baadhi ya mapungufu yanaweza kutumika au la.
2024-04-06 19:39:38 +00:00
{% endhint %}
### **Thamani Zilizorejeshwa**
2024-04-06 19:39:38 +00:00
Ikiwa data iliyowekwa inaweza kwa njia fulani kurejelewa kwenye majibu, ukurasa unaweza kuwa na mapungufu kadhaa.
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Kielelezo cha Upande wa Mteja**](client-side-template-injection-csti.md)
* [ ] [**Uingizaji wa Amri**](command-injection.md)
* [ ] [**CRLF**](crlf-0d-0a.md)
* [ ] [**Dangling Markup**](dangling-markup-html-scriptless-injection/)
* [ ] [**Uingizaji wa Faili/Uvukaji wa Njia**](file-inclusion/)
2024-04-06 19:39:38 +00:00
* [ ] [**Ukurasa wa Kuelekeza**](open-redirect.md)
* [ ] [**Uchafuzi wa Prototype hadi XSS**](deserialization/nodejs-proto-prototype-pollution/#client-side-prototype-pollution-to-xss)
* [ ] [**Uingizaji wa Upande wa Seva/Uingizaji wa Upande wa Edge**](server-side-inclusion-edge-side-inclusion-injection.md)
* [ ] [**Udukuzi wa Ombi la Upande wa Seva**](ssrf-server-side-request-forgery/)
* [ ] [**Uingizaji wa Kigezo cha Upande wa Seva**](ssti-server-side-template-injection/)
* [ ] [**Reverse Tab Nabbing**](reverse-tab-nabbing.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Upande wa Seva wa XSLT**](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
* [ ] [**XSS**](xss-cross-site-scripting/)
* [ ] [**XSSI**](xssi-cross-site-script-inclusion.md)
* [ ] [**XS-Search**](xs-search/)
Baadhi ya mapungufu yaliyotajwa yanahitaji hali maalum, wengine wanahitaji tu yaliyomo kurejelewa. Unaweza kupata polygloths za kuvutia kwa haraka kujaribu mapungufu kwenye:
2024-04-06 19:39:38 +00:00
{% content-ref url="pocs-and-polygloths-cheatsheet/" %}
[pocs-and-polygloths-cheatsheet](pocs-and-polygloths-cheatsheet/)
{% endcontent-ref %}
### **Vipengele vya Utafutaji**
Ikiwa kazi inaweza kutumika kutafuta aina fulani ya data kwenye seva ya nyuma, labda unaweza (kudukua) kutumia kutafuta data ya kiholela.
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Faili/Uvukaji wa Njia**](file-inclusion/)
* [ ] [**Udukuzi wa NoSQL**](nosql-injection.md)
* [ ] [**Udukuzi wa LDAP**](ldap-injection.md)
2024-04-06 19:39:38 +00:00
* [ ] [**ReDoS**](regular-expression-denial-of-service-redos.md)
* [ ] [**Uingizaji wa SQL**](sql-injection/)
* [ ] [**Uingizaji wa XPATH**](xpath-injection.md)
### **Fomu, WebSockets na PostMsgs**
Wakati soketi ya wavuti inatuma ujumbe au fomu inaruhusu watumiaji kutekeleza vitendo, mapungufu yanaweza kutokea.
2024-04-06 19:39:38 +00:00
* [ ] [**Udukuzi wa Ombi la Ulinganifu wa Maudhui**](csrf-cross-site-request-forgery.md)
* [ ] [**Udukuzi wa WebSocket wa Ulinganifu wa Maudhui (CSWSH)**](websocket-attacks.md)
* [ ] [**Mapungufu ya PostMessage**](postmessage-vulnerabilities/)
2024-04-06 19:39:38 +00:00
### **Vichwa vya HTTP**
2024-04-06 19:39:38 +00:00
Kulingana na vichwa vya HTTP vilivyotolewa na seva ya wavuti, mapungufu fulani yanaweza kuwepo.
2024-04-06 19:39:38 +00:00
* [ ] [**Clickjacking**](clickjacking.md)
* [ ] [**Kizuizi cha Usalama wa Maudhui**](content-security-policy-csp-bypass/)
* [ ] [**Kudukua kwa Kutumia Vidakuzi**](hacking-with-cookies/)
* [ ] [**CORS - Mipangilio Mibovu & Kudukua**](cors-bypass.md)
### **Mipitishaji**
Kuna vipengele kadhaa maalum ambapo njia za kuzunguka zinaweza kuwa na manufaa kuzipita
* [ ] [**2FA/OTP Kudukua**](2fa-bypass.md)
* [ ] [**Kupita Mchakato wa Malipo**](bypass-payment-process.md)
* [ ] [**Kudukua Captcha**](captcha-bypass.md)
* [ ] [**Kupita Kuingia**](login-bypass/)
* [ ] [**Hali ya Mashindano**](race-condition.md)
* [ ] [**Kupita Kikomo cha Kasi**](rate-limit-bypass.md)
* [ ] [**Kupita Kusahau Nenosiri**](reset-password.md)
* [ ] [**Mapungufu ya Usajili**](registration-vulnerabilities.md)
### **Vipengele Vilivyopangwa / Vipengele Maalum**
Baadhi ya vipengele vitahitaji **data iwe na muundo maalum sana** (kama kitu kilichosanidishwa kwa lugha au XML). Kwa hivyo, ni rahisi kutambua ikiwa programu inaweza kuwa na mapungufu kwani inahitaji kusindika aina hiyo ya data.\
Baadhi ya **vipengele maalum** vinaweza kuwa na mapungufu pia ikiwa **muundo maalum wa kuingia unatumika** (kama Uingizaji wa Kichwa cha Barua pepe).
* [ ] [**Utekelezaji wa Nyuma**](deserialization/)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Kichwa cha Barua pepe**](email-injections.md)
* [**Mapungufu ya JWT**](hacking-jwt-json-web-tokens.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Entiti ya Nje ya XML**](xxe-xee-xml-external-entity.md)
### Faili
Vipengele vinavyoruhusu kupakia faili vinaweza kuwa hatarini kwa masuala kadhaa. Vipengele vinavyozalisha faili ikiwa ni pamoja na matokeo ya mtumiaji yanaweza kutekeleza nambari isiyotarajiwa. Watumiaji wanaofungua faili zilizopakiwa na watumiaji au zilizozalishwa moja kwa moja ikiwa ni pamoja na matokeo ya mtumiaji wanaweza kuathiriwa.
2024-04-06 19:39:38 +00:00
* [ ] [**Kupakia Faili**](file-upload/)
* [ ] [**Uingizaji wa Fomula**](formula-csv-doc-latex-ghostscript-injection.md)
* [ ] [**Uingizaji wa PDF**](xss-cross-site-scripting/pdf-injection.md)
* [ ] [**XSS ya Upande wa Seva**](xss-cross-site-scripting/server-side-xss-dynamic-pdf.md)
### **Usimamizi wa Kitambulisho wa Nje**
* [ ] [**OAUTH hadi Uchukuzi wa Akaunti**](oauth-to-account-takeover.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Mashambulizi ya SAML**](saml-attacks/)
### **Udhaifu Mwingine wa Kusaidia**
2024-04-06 19:39:38 +00:00
Udhaifu huu unaweza kusaidia katika kuchexploit udhaifu mwingine.
2024-04-06 19:39:38 +00:00
* [ ] [**Kuchukua Kwa Kikoa/Subdomain**](domain-subdomain-takeover.md)
2024-04-06 19:39:38 +00:00
* [ ] [**IDOR**](idor.md)
* [ ] [**Uchafuzi wa Parameta**](parameter-pollution.md)
* [ ] [**Udhaifu wa Ukarasa wa Unicode**](unicode-injection/)
2024-04-06 19:39:38 +00:00
<details>
<summary><strong>Jifunze kuhusu kuhack AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2024-04-06 19:39:38 +00:00
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu zako za kuhack kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2024-04-06 19:39:38 +00:00
</details>