diff --git a/SUMMARY.md b/SUMMARY.md index 8d9d46bd4..cf0c7808f 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -172,6 +172,7 @@ * [69/UDP TFTP/Bittorrent-tracker](pentesting/69-udp-tftp.md) * [79 - Pentesting Finger](pentesting/pentesting-finger.md) * [80,443 - Pentesting Web Methodology](pentesting/pentesting-web/README.md) + * [Uncovering CloudFlare](pentesting/pentesting-web/uncovering-cloudflare.md) * [Laravel](pentesting/pentesting-web/laravel.md) * [Code Review Tools](pentesting/pentesting-web/code-review-tools.md) * [Symphony](pentesting/pentesting-web/symphony.md) diff --git a/pentesting-web/open-redirect.md b/pentesting-web/open-redirect.md index dead43f3e..555e0028a 100644 --- a/pentesting-web/open-redirect.md +++ b/pentesting-web/open-redirect.md @@ -8,6 +8,9 @@ Using a whitelisted domain or keyword ```text www.whitelisted.com.evil.com redirect to evil.com +https://www.target01.com//example.com/ redirect to //example.com/ +https://www.target01.com%09.example.com redirect to example.com +https://www.target01.com%252e.example.com redirect to example.com ``` Using "//" to bypass "http" blacklisted keyword diff --git a/pentesting/pentesting-web/uncovering-cloudflare.md b/pentesting/pentesting-web/uncovering-cloudflare.md new file mode 100644 index 000000000..439b149f3 --- /dev/null +++ b/pentesting/pentesting-web/uncovering-cloudflare.md @@ -0,0 +1,8 @@ +# Uncovering CloudFlare + +Techniques to try to uncover web servers behind cloudflare: + +* Search for the domain inside [http://www.crimeflare.org:82/cfs.html](http://www.crimeflare.org:82/cfs.html) +* \*\*\*\*[**CloudFlair**](https://github.com/christophetd/CloudFlair) is a tool that will search using Censys certificates that contains the domain name, then it will search for IPv4s inside those certificates and finally it will try to access the web page in those IPs. +* You can also use some service that gives you the historical DNS records of the domain. Maybe the web page is running on an IP address used before. +