mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 20:53:37 +00:00
GitBook: [master] 3 pages modified
This commit is contained in:
parent
3dbed86121
commit
e63b5800b7
3 changed files with 12 additions and 0 deletions
|
@ -172,6 +172,7 @@
|
||||||
* [69/UDP TFTP/Bittorrent-tracker](pentesting/69-udp-tftp.md)
|
* [69/UDP TFTP/Bittorrent-tracker](pentesting/69-udp-tftp.md)
|
||||||
* [79 - Pentesting Finger](pentesting/pentesting-finger.md)
|
* [79 - Pentesting Finger](pentesting/pentesting-finger.md)
|
||||||
* [80,443 - Pentesting Web Methodology](pentesting/pentesting-web/README.md)
|
* [80,443 - Pentesting Web Methodology](pentesting/pentesting-web/README.md)
|
||||||
|
* [Uncovering CloudFlare](pentesting/pentesting-web/uncovering-cloudflare.md)
|
||||||
* [Laravel](pentesting/pentesting-web/laravel.md)
|
* [Laravel](pentesting/pentesting-web/laravel.md)
|
||||||
* [Code Review Tools](pentesting/pentesting-web/code-review-tools.md)
|
* [Code Review Tools](pentesting/pentesting-web/code-review-tools.md)
|
||||||
* [Symphony](pentesting/pentesting-web/symphony.md)
|
* [Symphony](pentesting/pentesting-web/symphony.md)
|
||||||
|
|
|
@ -8,6 +8,9 @@ Using a whitelisted domain or keyword
|
||||||
|
|
||||||
```text
|
```text
|
||||||
www.whitelisted.com.evil.com redirect to evil.com
|
www.whitelisted.com.evil.com redirect to evil.com
|
||||||
|
https://www.target01.com//example.com/ redirect to //example.com/
|
||||||
|
https://www.target01.com%09.example.com redirect to example.com
|
||||||
|
https://www.target01.com%252e.example.com redirect to example.com
|
||||||
```
|
```
|
||||||
|
|
||||||
Using "//" to bypass "http" blacklisted keyword
|
Using "//" to bypass "http" blacklisted keyword
|
||||||
|
|
8
pentesting/pentesting-web/uncovering-cloudflare.md
Normal file
8
pentesting/pentesting-web/uncovering-cloudflare.md
Normal file
|
@ -0,0 +1,8 @@
|
||||||
|
# Uncovering CloudFlare
|
||||||
|
|
||||||
|
Techniques to try to uncover web servers behind cloudflare:
|
||||||
|
|
||||||
|
* Search for the domain inside [http://www.crimeflare.org:82/cfs.html](http://www.crimeflare.org:82/cfs.html)
|
||||||
|
* \*\*\*\*[**CloudFlair**](https://github.com/christophetd/CloudFlair) is a tool that will search using Censys certificates that contains the domain name, then it will search for IPv4s inside those certificates and finally it will try to access the web page in those IPs.
|
||||||
|
* You can also use some service that gives you the historical DNS records of the domain. Maybe the web page is running on an IP address used before.
|
||||||
|
|
Loading…
Reference in a new issue