mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-21 20:23:18 +00:00
GitBook: [master] 2 pages modified
This commit is contained in:
parent
a7f381dadf
commit
8da46eec34
2 changed files with 17 additions and 0 deletions
|
@ -303,6 +303,19 @@ Now that we have built the list of assets of our scope it's time to search for s
|
|||
|
||||
**Dorks**: _AWS\_SECRET\_ACCESS\_KEY, API KEY, API SECRET, API TOKEN… ROOT PASSWORD, ADMIN PASSWORD, COMPANYNAME SECRET, COMPANYNAME ROOT, GCP SECRET, AWS SECRET, “username password” extension:sql, “private” extension:pgp..._
|
||||
|
||||
#### More Github Dorks
|
||||
|
||||
* extension:pem private
|
||||
* extension:ppk private
|
||||
* extension:sql mysql dump password
|
||||
* extension:json api.forecast.io
|
||||
* extension:json mongolab.com
|
||||
* extension:yaml mongolab.com
|
||||
* extension:ica \[WFClient\] Password=
|
||||
* extension:avastlic “support.avast.com”
|
||||
* extension:js jsforce conn.login
|
||||
* extension:json googleusercontent client\_secret
|
||||
|
||||
## [**Pentesting Web Methodology**](pentesting/pentesting-web/)\*\*\*\*
|
||||
|
||||
Anyway, the **majority of the vulnerabilities** found by bug hunters resides inside **web applications**, so at this point I would like to talk about a **web application testing methodology**, and you can [**find this information here**](pentesting/pentesting-web/).
|
||||
|
|
|
@ -13,6 +13,10 @@ X-Originating-IP: 127.0.0.1
|
|||
X-Forwarded-For: 127.0.0.1
|
||||
X-Remote-IP: 127.0.0.1
|
||||
X-Remote-Addr: 127.0.0.1
|
||||
X-Client-IP: 127.0.0.1
|
||||
X-Host: 127.0.0.1
|
||||
X-Forwared-Host: 127.0.0.1
|
||||
|
||||
|
||||
#or use double X-Forwared-For header
|
||||
X-Forwarded-For:
|
||||
|
|
Loading…
Reference in a new issue