mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 14:08:26 +00:00
Merge pull request #875 from IckoGZ/master
Update jinja2-ssti.md - Adding tool for WAF bypass
This commit is contained in:
commit
9a1a23617e
1 changed files with 33 additions and 0 deletions
|
@ -312,6 +312,39 @@ Once you have found some functions you can recover the builtins with:
|
||||||
# All the bypasses seen in the previous sections are also valid
|
# All the bypasses seen in the previous sections are also valid
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Fuzzing WAF bypass
|
||||||
|
|
||||||
|
**Fenjing** [https://github.com/Marven11/Fenjing](https://github.com/Marven11/Fenjing) is a tool that its specialized on CTFs but can be also useful to bruteforce invalid params on a real scenario.
|
||||||
|
The tool just spray words and queries to detect filters, searching for bypasses, and also provide a interactive console.
|
||||||
|
|
||||||
|
English-Chinese Google translation
|
||||||
|
|
||||||
|
```
|
||||||
|
webui:
|
||||||
|
As the name suggests, web UI
|
||||||
|
Default port 11451
|
||||||
|
|
||||||
|
scan: scan the entire website
|
||||||
|
Extract all forms from the website based on the form element and attack them
|
||||||
|
After the scan is successful, a simulated terminal will be provided or the given command will be executed.
|
||||||
|
Example:python -m fenjing scan --url 'http://xxx/'
|
||||||
|
|
||||||
|
crack: Attack a specific form
|
||||||
|
You need to specify the form's url, action (GET or POST) and all fields (such as 'name')
|
||||||
|
After a successful attack, a simulated terminal will also be provided or a given command will be executed.
|
||||||
|
Example:python -m fenjing crack --url 'http://xxx/' --method GET --inputs name
|
||||||
|
|
||||||
|
crack-path: attack a specific path
|
||||||
|
Attack http://xxx.xxx/hello/<payload>the vulnerabilities that exist in a certain path (such as
|
||||||
|
The parameters are roughly the same as crack, but you only need to provide the corresponding path
|
||||||
|
Example:python -m fenjing crack-path --url 'http://xxx/hello/'
|
||||||
|
|
||||||
|
crack-request: Read a request file for attack
|
||||||
|
Read the request in the file, PAYLOADreplace it with the actual payload and submit it
|
||||||
|
The request will be urlencoded by default according to the HTTP format, which can be --urlencode-payload 0turned off.
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
## References
|
## References
|
||||||
|
|
||||||
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection#jinja2](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection#jinja2)
|
* [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection#jinja2](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection#jinja2)
|
||||||
|
|
Loading…
Add table
Reference in a new issue