hacktricks/pentesting-web/web-vulnerabilities-methodology.md

153 lines
8.8 KiB
Markdown
Raw Normal View History

# Mbinu za Kutambua Mapungufu kwenye Wavuti
2024-04-06 19:39:38 +00:00
<details>
<summary><strong>Jifunze kuhusu kudukua AWS kutoka mwanzo hadi mtaalamu na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
2024-04-06 19:39:38 +00:00
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako ikionekana kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA USAJILI**](https://github.com/sponsors/carlospolop)!
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2024-04-06 19:39:38 +00:00
</details>
Katika kila Uchunguzi wa Wavuti, kuna **maeneo mengi yaliyofichwa na dhahiri ambayo yanaweza kuwa na mapungufu**. Chapisho hili linakusudiwa kuwa orodha ya kuhakikisha kuwa umetafuta mapungufu katika maeneo yote yanayowezekana.
2024-04-06 19:39:38 +00:00
## Proxies
{% hint style="info" %}
Leo hii **maombi ya wavuti** kawaida **hutumia** aina fulani ya **proxies za kati**, ambazo zinaweza kutumiwa kudukua mapungufu. Mapungufu haya yanahitaji kuwepo kwa proxy dhaifu, lakini kawaida pia yanahitaji mapungufu ya ziada kwenye seva ya nyuma.
2024-04-06 19:39:38 +00:00
{% endhint %}
* [ ] [**Kudukua vichwa vya hop-by-hop**](abusing-hop-by-hop-headers.md)
* [ ] [**Udanganyifu wa Cache/Cache Deception**](cache-deception/)
* [ ] [**Kudukua Maombi ya HTTP**](http-request-smuggling/)
2024-04-06 19:39:38 +00:00
* [ ] [**H2C Smuggling**](h2c-smuggling.md)
* [ ] [**Uingizaji wa Upande wa Seva/Uingizaji wa Upande wa Mipaka**](server-side-inclusion-edge-side-inclusion-injection.md)
* [ ] [**Kufunua Cloudflare**](../network-services-pentesting/pentesting-web/uncovering-cloudflare.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Upande wa Seva wa XSLT**](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
* [ ] [**Kudukua Kinga ya Proxy / WAF**](proxy-waf-protections-bypass.md)
2024-04-06 19:39:38 +00:00
## **Ingizo la Mtumiaji**
2024-04-06 19:39:38 +00:00
{% hint style="info" %}
Zaidi ya maombi ya wavuti **itaruhusu watumiaji kuingiza baadhi ya data ambayo itashughulikiwa baadaye.**\
Kulingana na muundo wa data ambayo seva inatarajia, baadhi ya mapungufu yanaweza kutumika au kutotumika.
2024-04-06 19:39:38 +00:00
{% endhint %}
### **Thamani Zilizorejeshwa**
2024-04-06 19:39:38 +00:00
Ikiwa data iliyowekwa inaweza kwa njia fulani kurejelewa kwenye majibu, ukurasa unaweza kuwa na mapungufu kadhaa.
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Kigezo cha Upande wa Mteja**](client-side-template-injection-csti.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Amri**](command-injection.md)
* [ ] [**CRLF**](crlf-0d-0a.md)
* [ ] [**Dangling Markup**](dangling-markup-html-scriptless-injection/)
* [ ] [**Uingizaji wa Faili/Uvukaji wa Njia**](file-inclusion/)
2024-04-06 19:39:38 +00:00
* [ ] [**Ukurasa wa Kuelekeza**](open-redirect.md)
* [ ] [**Uchafuzi wa Prototype hadi XSS**](deserialization/nodejs-proto-prototype-pollution/#client-side-prototype-pollution-to-xss)
* [ ] [**Uingizaji wa Upande wa Seva/Uingizaji wa Upande wa Mipaka**](server-side-inclusion-edge-side-inclusion-injection.md)
* [ ] [**Udukuzi wa Ombi la Upande wa Seva**](ssrf-server-side-request-forgery/)
* [ ] [**Uingizaji wa Templeti wa Upande wa Seva**](ssti-server-side-template-injection/)
* [ ] [**Reverse Tab Nabbing**](reverse-tab-nabbing.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Upande wa Seva wa XSLT**](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
* [ ] [**XSS**](xss-cross-site-scripting/)
* [ ] [**XSSI**](xssi-cross-site-script-inclusion.md)
* [ ] [**XS-Search**](xs-search/)
Baadhi ya mapungufu yaliyotajwa yanahitaji hali maalum, wengine wanahitaji tu yaliyomo kurudiwa. Unaweza kupata polygloths za kuvutia kwa haraka kujaribu mapungufu kwenye:
2024-04-06 19:39:38 +00:00
{% content-ref url="pocs-and-polygloths-cheatsheet/" %}
[pocs-and-polygloths-cheatsheet](pocs-and-polygloths-cheatsheet/)
{% endcontent-ref %}
### **Vipengele vya Utafutaji**
Ikiwa kazi inaweza kutumika kutafuta aina fulani ya data kwenye seva ya nyuma, labda unaweza (kudukua) kutumia kutafuta data ya kupotosha.
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Faili/Uvukaji wa Njia**](file-inclusion/)
* [ ] [**Uingizaji wa NoSQL**](nosql-injection.md)
* [ ] [**Uingizaji wa LDAP**](ldap-injection.md)
2024-04-06 19:39:38 +00:00
* [ ] [**ReDoS**](regular-expression-denial-of-service-redos.md)
* [ ] [**Uingizaji wa SQL**](sql-injection/)
* [ ] [**Uingizaji wa XPATH**](xpath-injection.md)
### **Fomu, WebSockets na PostMsgs**
Wakati soketi ya wavuti inatuma ujumbe au fomu inaruhusu watumiaji kutekeleza vitendo, mapungufu yanaweza kutokea.
2024-04-06 19:39:38 +00:00
* [ ] [**Udukuzi wa Ombi la Ulinganifu wa Maudhui**](csrf-cross-site-request-forgery.md)
* [ ] [**Udukuzi wa WebSocket wa Ulinganifu wa Maudhui (CSWSH)**](websocket-attacks.md)
* [ ] [**Mapungufu ya PostMessage**](postmessage-vulnerabilities/)
2024-04-06 19:39:38 +00:00
### **Vichwa vya HTTP**
2024-04-06 19:39:38 +00:00
Kulingana na vichwa vya HTTP vilivyotolewa na seva ya wavuti, mapungufu fulani yanaweza kuwepo.
2024-04-06 19:39:38 +00:00
* [ ] [**Clickjacking**](clickjacking.md)
* [ ] [**Kizuizi cha Usalama wa Maudhui kwa kipande**](content-security-policy-csp-bypass/)
* [ ] [**Kudukua kwa Kutumia Vidakuzi**](hacking-with-cookies/)
* [ ] [**CORS - Mipangilio isiyo sahihi & Kudukua**](cors-bypass.md)
### **Kupita**
Kuna vipengele kadhaa maalum ambapo njia mbadala zinaweza kuwa na manufaa kwa kuzipita
* [ ] [**Kupita 2FA/OTP**](2fa-bypass.md)
* [ ] [**Kupita Mchakato wa Malipo**](bypass-payment-process.md)
* [ ] [**Kupita Captcha**](captcha-bypass.md)
* [ ] [**Kupita Kuingia**](login-bypass/)
* [ ] [**Hali ya Mashindano**](race-condition.md)
* [ ] [**Kupita Kikomo cha Kasi**](rate-limit-bypass.md)
* [ ] [**Kupita Kusahau Nenosiri**](reset-password.md)
* [ ] [**Mapungufu ya Usajili**](registration-vulnerabilities.md)
### **Vipengele Vinavyostruktua / Vipengele Maalum**
Baadhi ya vipengele vitahitaji **data iwe na muundo maalum sana** (kama kitu kilichosaniduliwa kwa lugha au XML). Kwa hivyo, ni rahisi kutambua ikiwa programu inaweza kuwa na mapungufu kwani inahitaji kusindika aina hiyo ya data.\
Baadhi ya **vipengele maalum** vinaweza kuwa na mapungufu pia ikiwa **muundo maalum wa kuingia unatumika** (kama Uingizaji wa Kichwa cha Barua pepe).
* [ ] [**Utekelezaji wa Nyuma**](deserialization/)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Kichwa cha Barua pepe**](email-injections.md)
* [ ] [**Mapungufu ya JWT**](hacking-jwt-json-web-tokens.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Entiti ya Nje ya XML**](xxe-xee-xml-external-entity.md)
### Faili
Vipengele vinavyoruhusu kupakia faili vinaweza kuwa hatarini kwa masuala kadhaa. Vipengele vinavyozalisha faili ikiwa ni pamoja na matokeo ya mtumiaji yanaweza kutekeleza nambari isiyotarajiwa. Watumiaji wanaofungua faili zilizopakiwa na watumiaji au zilizozalishwa moja kwa moja ikiwa ni pamoja na matokeo ya mtumiaji wanaweza kuathiriwa.
2024-04-06 19:39:38 +00:00
* [ ] [**Pakia Faili**](file-upload/)
2024-04-06 19:39:38 +00:00
* [ ] [**Uingizaji wa Fomula**](formula-csv-doc-latex-ghostscript-injection.md)
* [ ] [**Uingizaji wa PDF**](xss-cross-site-scripting/pdf-injection.md)
* [ ] [**XSS ya Upande wa Seva**](xss-cross-site-scripting/server-side-xss-dynamic-pdf.md)
### **Usimamizi wa Kitambulisho wa Nje**
* [ ] [**OAUTH hadi Uchukuzi wa Akaunti**](oauth-to-account-takeover.md)
2024-04-06 19:39:38 +00:00
* [ ] [**Mashambulizi ya SAML**](saml-attacks/)
### **Udhaifu Mwingine wa Kusaidia**
2024-04-06 19:39:38 +00:00
Udhaifu hawa wanaweza kusaidia katika kuchunguza udhaifu mwingine.
2024-04-06 19:39:38 +00:00
* [ ] [**Kuchukua Kikoa/Subdomain**](domain-subdomain-takeover.md)
2024-04-06 19:39:38 +00:00
* [ ] [**IDOR**](idor.md)
* [ ] [**Uchafuzi wa Parameta**](parameter-pollution.md)
* [ ] [**Udhaifu wa Ukarasa wa Unicode**](unicode-injection/)
2024-04-06 19:39:38 +00:00
<details>
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
2024-04-06 19:39:38 +00:00
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2024-04-06 19:39:38 +00:00
</details>