hacktricks/pentesting-web/web-vulnerabilities-methodology/README.md

158 lines
8.8 KiB
Markdown
Raw Normal View History

# Web Vulnerabilities Methodology
2022-09-12 18:43:22 +00:00
{% hint style="success" %}
Učite i vežbajte AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Učite i vežbajte GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-09-12 18:43:22 +00:00
<details>
2022-09-12 18:43:22 +00:00
<summary>Podržite HackTricks</summary>
2024-01-01 17:15:42 +00:00
* Proverite [**planove pretplate**](https://github.com/sponsors/carlospolop)!
* **Pridružite se** 💬 [**Discord grupi**](https://discord.gg/hRep4RUj7f) ili [**telegram grupi**](https://t.me/peass) ili **pratite** nas na **Twitteru** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Podelite hakerske trikove slanjem PR-ova na** [**HackTricks**](https://github.com/carlospolop/hacktricks) i [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repozitorijume.
2022-09-12 18:43:22 +00:00
</details>
{% endhint %}
2022-09-12 18:43:22 +00:00
U svakom Web Pentestu, postoji **several hidden and obvious places that might be vulnerable**. Ovaj post je zamišljen kao kontrolna lista da potvrdite da ste tražili ranjivosti na svim mogućim mestima.
2022-09-12 18:43:22 +00:00
## Proxies
2022-09-12 18:43:22 +00:00
{% hint style="info" %}
Danas **web** **aplikacije** obično **koriste** neku vrstu **posredničkih** **proxy-a**, koje se mogu (zlo)upotrebljavati za eksploataciju ranjivosti. Ove ranjivosti zahtevaju da postoji ranjivi proxy, ali obično takođe zahtevaju neku dodatnu ranjivost u pozadini.
2022-09-12 18:43:22 +00:00
{% endhint %}
* [ ] [**Abusing hop-by-hop headers**](../abusing-hop-by-hop-headers.md)
* [ ] [**Cache Poisoning/Cache Deception**](../cache-deception.md)
* [ ] [**HTTP Request Smuggling**](../http-request-smuggling/)
* [ ] [**H2C Smuggling**](../h2c-smuggling.md)
* [ ] [**Server Side Inclusion/Edge Side Inclusion**](../server-side-inclusion-edge-side-inclusion-injection.md)
* [ ] [**Uncovering Cloudflare**](../../network-services-pentesting/pentesting-web/uncovering-cloudflare.md)
* [ ] [**XSLT Server Side Injection**](../xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
* [ ] [**Proxy / WAF Protections Bypass**](../proxy-waf-protections-bypass.md)
2022-09-12 18:43:22 +00:00
## **User input**
2022-09-12 18:43:22 +00:00
{% hint style="info" %}
Većina web aplikacija će **dozvoliti korisnicima da unesu neke podatke koji će kasnije biti obrađeni.**\
U zavisnosti od strukture podataka koje server očekuje, neke ranjivosti mogu ili ne moraju da se primene.
2022-09-12 18:43:22 +00:00
{% endhint %}
### **Reflected Values**
2022-09-12 18:43:22 +00:00
Ako se uneti podaci mogu na neki način odraziti u odgovoru, stranica može biti ranjiva na nekoliko problema.
2022-09-12 18:43:22 +00:00
* [ ] [**Client Side Template Injection**](../client-side-template-injection-csti.md)
* [ ] [**Command Injection**](../command-injection.md)
2022-09-12 18:43:22 +00:00
* [ ] [**CRLF**](../crlf-0d-0a.md)
* [ ] [**Dangling Markup**](../dangling-markup-html-scriptless-injection/)
* [ ] [**File Inclusion/Path Traversal**](../file-inclusion/)
* [ ] [**Open Redirect**](../open-redirect.md)
* [ ] [**Prototype Pollution to XSS**](../deserialization/nodejs-proto-prototype-pollution/#client-side-prototype-pollution-to-xss)
* [ ] [**Server Side Inclusion/Edge Side Inclusion**](../server-side-inclusion-edge-side-inclusion-injection.md)
* [ ] [**Server Side Request Forgery**](../ssrf-server-side-request-forgery/)
* [ ] [**Server Side Template Injection**](../ssti-server-side-template-injection/)
* [ ] [**Reverse Tab Nabbing**](../reverse-tab-nabbing.md)
* [ ] [**XSLT Server Side Injection**](../xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
2022-09-12 18:43:22 +00:00
* [ ] [**XSS**](../xss-cross-site-scripting/)
* [ ] [**XSSI**](../xssi-cross-site-script-inclusion.md)
* [ ] [**XS-Search**](../xs-search.md)
Neke od pomenutih ranjivosti zahtevaju posebne uslove, dok druge samo zahtevaju da se sadržaj odrazi. Možete pronaći neke zanimljive poliglotove za brzo testiranje ranjivosti u:
2022-09-12 18:43:22 +00:00
{% content-ref url="../pocs-and-polygloths-cheatsheet/" %}
[pocs-and-polygloths-cheatsheet](../pocs-and-polygloths-cheatsheet/)
{% endcontent-ref %}
### **Search functionalities**
2022-09-12 18:43:22 +00:00
Ako se funkcionalnost može koristiti za pretraživanje nekih podataka unutar pozadine, možda je možete (zlo)upotrebiti za pretraživanje proizvoljnih podataka.
2022-09-12 18:43:22 +00:00
* [ ] [**File Inclusion/Path Traversal**](../file-inclusion/)
* [ ] [**NoSQL Injection**](../nosql-injection.md)
* [ ] [**LDAP Injection**](../ldap-injection.md)
2022-09-12 18:43:22 +00:00
* [ ] [**ReDoS**](../regular-expression-denial-of-service-redos.md)
* [ ] [**SQL Injection**](../sql-injection/)
* [ ] [**XPATH Injection**](../xpath-injection.md)
2022-09-12 18:43:22 +00:00
### **Forms, WebSockets and PostMsgs**
2022-09-12 18:43:22 +00:00
Kada websocket pošalje poruku ili forma dozvoli korisnicima da izvrše akcije, ranjivosti se mogu pojaviti.
2022-09-12 18:43:22 +00:00
* [ ] [**Cross Site Request Forgery**](../csrf-cross-site-request-forgery.md)
* [ ] [**Cross-site WebSocket hijacking (CSWSH)**](../websocket-attacks.md)
* [ ] [**PostMessage Vulnerabilities**](../postmessage-vulnerabilities/)
2022-09-12 18:43:22 +00:00
### **HTTP Headers**
2022-09-12 18:43:22 +00:00
U zavisnosti od HTTP zaglavlja koje daje web server, neke ranjivosti mogu biti prisutne.
2022-09-12 18:43:22 +00:00
* [ ] [**Clickjacking**](../clickjacking.md)
* [ ] [**Content Security Policy bypass**](../content-security-policy-csp-bypass/)
* [ ] [**Cookies Hacking**](../hacking-with-cookies/)
* [ ] [**CORS - Misconfigurations & Bypass**](../cors-bypass.md)
2022-09-12 18:43:22 +00:00
### **Bypasses**
2022-09-12 18:43:22 +00:00
Postoji nekoliko specifičnih funkcionalnosti gde bi neka rešenja mogla biti korisna za zaobilaženje.
2022-09-12 18:43:22 +00:00
* [ ] [**2FA/OTP Bypass**](../2fa-bypass.md)
* [ ] [**Bypass Payment Process**](../bypass-payment-process.md)
* [ ] [**Captcha Bypass**](../captcha-bypass.md)
* [ ] [**Login Bypass**](../login-bypass/)
* [ ] [**Race Condition**](../race-condition.md)
* [ ] [**Rate Limit Bypass**](../rate-limit-bypass.md)
* [ ] [**Reset Forgotten Password Bypass**](../reset-password.md)
* [ ] [**Registration Vulnerabilities**](../registration-vulnerabilities.md)
### **Structured objects / Specific functionalities**
2022-09-12 18:43:22 +00:00
Neke funkcionalnosti će zahtevati da **podaci budu strukturirani u vrlo specifičnom formatu** (kao što je jezik serijalizovanog objekta ili XML). Stoga, lakše je identifikovati da li aplikacija može biti ranjiva jer mora obraditi tu vrstu podataka.\
Neke **specifične funkcionalnosti** takođe mogu biti ranjive ako se koristi **specifičan format unosa** (kao što su Email Header Injections).
2022-09-12 18:43:22 +00:00
* [ ] [**Deserialization**](../deserialization/)
* [ ] [**Email Header Injection**](../email-injections.md)
* [ ] [**JWT Vulnerabilities**](../hacking-jwt-json-web-tokens.md)
* [ ] [**XML External Entity**](../xxe-xee-xml-external-entity.md)
2022-09-12 18:43:22 +00:00
### Files
2022-09-12 18:43:22 +00:00
Funkcionalnosti koje omogućavaju učitavanje fajlova mogu biti ranjive na nekoliko problema.\
Funkcionalnosti koje generišu fajlove uključujući korisnički unos mogu izvršiti neočekivani kod.\
Korisnici koji otvore fajlove koje su učitali drugi korisnici ili automatski generisani uključujući korisnički unos mogu biti kompromitovani.
2022-09-12 18:43:22 +00:00
* [ ] [**File Upload**](../file-upload/)
* [ ] [**Formula Injection**](../formula-csv-doc-latex-ghostscript-injection.md)
* [ ] [**PDF Injection**](../xss-cross-site-scripting/pdf-injection.md)
* [ ] [**Server Side XSS**](../xss-cross-site-scripting/server-side-xss-dynamic-pdf.md)
2022-09-12 18:43:22 +00:00
### **External Identity Management**
2022-09-12 18:43:22 +00:00
* [ ] [**OAUTH to Account takeover**](../oauth-to-account-takeover.md)
* [ ] [**SAML Attacks**](../saml-attacks/)
2022-09-12 18:43:22 +00:00
### **Other Helpful Vulnerabilities**
2022-09-12 18:43:22 +00:00
Ove ranjivosti mogu pomoći u eksploataciji drugih ranjivosti.
2022-09-12 18:43:22 +00:00
* [ ] [**Domain/Subdomain takeover**](../domain-subdomain-takeover.md)
2022-09-12 18:43:22 +00:00
* [ ] [**IDOR**](../idor.md)
* [ ] [**Parameter Pollution**](../parameter-pollution.md)
* [ ] [**Unicode Normalization vulnerability**](../unicode-injection/)
2022-09-12 18:43:22 +00:00
{% hint style="success" %}
Učite i vežbajte AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Učite i vežbajte GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-09-12 18:43:22 +00:00
<details>
2022-09-12 18:43:22 +00:00
<summary>Podržite HackTricks</summary>
2024-01-01 17:15:42 +00:00
* Proverite [**planove pretplate**](https://github.com/sponsors/carlospolop)!
* **Pridružite se** 💬 [**Discord grupi**](https://discord.gg/hRep4RUj7f) ili [**telegram grupi**](https://t.me/peass) ili **pratite** nas na **Twitteru** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Podelite hakerske trikove slanjem PR-ova na** [**HackTricks**](https://github.com/carlospolop/hacktricks) i [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repozitorijume.
2022-09-12 18:43:22 +00:00
</details>
{% endhint %}