mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-15 09:27:32 +00:00
GitBook: [master] 3 pages modified
This commit is contained in:
parent
a518d603e3
commit
9d73005b51
3 changed files with 9 additions and 8 deletions
|
@ -751,7 +751,9 @@ AndroL4b is an Android security virtual machine based on ubuntu-mate includes th
|
|||
|
||||
### OWASP
|
||||
|
||||
{% embed url="https://github.com/OWASP/owasp-mstg%0Ahttps://mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06g-testing-network-communication" %}
|
||||
{% embed url="https://github.com/OWASP/owasp-mstg" %}
|
||||
|
||||
{% embed url="https://mobile-security.gitbook.io/mobile-security-testing-guide/ios-testing-guide/0x06g-testing-network-communication" %}
|
||||
|
||||
### Git Repos
|
||||
|
||||
|
|
|
@ -27,7 +27,6 @@ Pragma: no-cache
|
|||
Location: https://192.168.5.237/owa/
|
||||
Server: Microsoft-IIS/10.0
|
||||
X-FEServer: NHEXCHANGE2016
|
||||
|
||||
```
|
||||
|
||||
## Execute .config files
|
||||
|
@ -155,7 +154,6 @@ You can also use **metasploit**: `use scanner/http/iis_shortname_scanner`
|
|||
|
||||
You can try to **mix** this **vulnerability** and the last one to find new **folders** and **bypass** the authentication.
|
||||
|
||||
|
||||
## ASP.NET Trace.AXD enabled debugging
|
||||
|
||||
ASP.NET include a debugging mode and its file is called `trace.axd`.
|
||||
|
@ -164,6 +162,7 @@ It keeps a very detailed log of all requests made to an application over a perio
|
|||
|
||||
This information includes remote client IP's, session IDs, all request and response cookies, physical paths, source code information, and potentially even usernames and passwords.
|
||||
|
||||
https://www.rapid7.com/db/vulnerabilities/spider-asp-dot-net-trace-axd/
|
||||
[https://www.rapid7.com/db/vulnerabilities/spider-asp-dot-net-trace-axd/](https://www.rapid7.com/db/vulnerabilities/spider-asp-dot-net-trace-axd/)
|
||||
|
||||
![Screenshot 2021-03-30 at 13 19 11](https://user-images.githubusercontent.com/31736688/112974448-2690b000-915b-11eb-896c-f41c27c44286.png)
|
||||
|
||||
|
|
Loading…
Reference in a new issue