{"id":1012,"date":"2022-07-30T12:04:53","date_gmt":"2022-07-30T17:04:53","guid":{"rendered":"https:\/\/www.searchevolution.com\/security\/?p=1012"},"modified":"2022-07-30T12:04:53","modified_gmt":"2022-07-30T17:04:53","slug":"notes-pour-trouver-des-failles-de-securite","status":"publish","type":"post","link":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/","title":{"rendered":"Notes pour trouver des failles de s\u00e9curit\u00e9"},"content":{"rendered":"<p>subfinder -d disney.com -silent -all \u00c0 httpx -silent -threads 100 | nuclei -id CVE-2022-26138 -v<\/p>\n<p>fuxploider : file upload vulnerability scanner and exploitation tool<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>If you want to bypass endpoint always to use own methodology. <\/p>\n<p>Example: <\/p>\n<p>Http Header based bypass: <\/p>\n<p>1. X Original URL: \/redact <\/p>\n<p>Example: <\/p>\n<p>GET \/api\/getUser HTTP\/1.1 -> 403<br \/>\nHost: redact.com <\/p>\n<p>GET \/ HTTP\/1.1<br \/>\nHost: redact.com<br \/>\nX Original URL: \/api\/getUser -> 200 OK <\/p>\n<p>2. Referer: https:\/\/site.com\/api\/redact <\/p>\n<p>Example: <\/p>\n<p>GET \/api\/getUser HTTP\/1.1 -> access denied<br \/>\nHost: redact.com <\/p>\n<p>GET \/ HTTP\/1.1<br \/>\nHost: redact.com<br \/>\nReferer: https:\/\/site.com\/api\/getUser \u2014> 200 OK <\/p>\n<p>or <\/p>\n<p>GET \/api\/getUser HTTP\/1.1<br \/>\nHost: redact.com<br \/>\nReferer: https:\/\/site.com\/api\/getUser -> 200 OK <\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\nexpression r\u00e9guli\u00e8re pour trouver des secrets<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>Bug bounty platform<br \/>\nbugcrowd<br \/>\nhackerone<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>Trouver des comptes administrateurs<\/p>\n<p>cat domains_list.txt  | httpx -ports 80,443,8080,8443 -paths &#8220;wordlist.txt&#8221; -mr &#8220;password&#8221;<\/p>\n<p>https:\/\/raw.githubusercontent.com\/the-robot\/admin-finder\/master\/wordlist.txt<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>\nJava Deserialization Cheat Sheet<br \/>\nhttps:\/\/github.com\/GrrrDog\/Java-Deserialization-Cheat-Sheet<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>Automation Time-based Blind SQL injection on HTTP Headers using Blisqy tool<br \/>\nhttps:\/\/github.com\/JohnTroony\/Blisqy<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\nZeratool v2.2: Automatic Exploit Generation (AEG) with automated remote libc leaking and ret2dlresolve rop chain generation for exploitable CTF problems.<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\nscraping login with xss<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"KNyTGGAvdw\"><p><a href=\"https:\/\/www.trustedsec.com\/blog\/scraping-login-credentials-with-xss\/\">Scraping Login Credentials With XSS<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Scraping Login Credentials With XSS&#8221; &#8212; TrustedSec\" src=\"https:\/\/www.trustedsec.com\/blog\/scraping-login-credentials-with-xss\/embed\/#?secret=xo0WBIAAnO#?secret=KNyTGGAvdw\" data-secret=\"KNyTGGAvdw\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>Dlinject &#8211; Inject A Shared Library (I.E. Arbitrary Code) Into A Live Linux Process, Without Ptrace<br \/>\nhttps:\/\/www.kitploit.com\/2022\/07\/dlinject-inject-shared-library-ie.html?utm_source=dlvr.it&#038;utm_medium=twitter<br \/>\nhttps:\/\/github.com\/DavidBuchanan314\/dlinject<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\nmake url path combinations using a wordlist<br \/>\nhttps:\/\/github.com\/trickest\/mkpath<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>subfinder -d disney.com -silent -all \u00c0 httpx -silent -threads 100 | nuclei -id CVE-2022-26138 -v fuxploider : file upload vulnerability scanner and exploitation tool &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; If you want to bypass endpoint always to use own methodology. Example: Http Header based bypass: 1. X Original URL: \/redact Example: GET \/api\/getUser HTTP\/1.1 -> 403 Host: redact.com GET \/ HTTP\/1.1 Host: redact.com X Original URL: \/api\/getUser -> 200 OK 2. Referer: https:\/\/site.com\/api\/redact Example: GET \/api\/getUser HTTP\/1.1 -> access denied Host: redact.com GET \/ HTTP\/1.1 Host: redact.com Referer: https:\/\/site.com\/api\/getUser \u2014> 200 OK or GET \/api\/getUser HTTP\/1.1 Host: redact.com Referer: https:\/\/site.com\/api\/getUser -> 200 OK &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Notes pour trouver des failles de s\u00e9curit\u00e9 - S\u00e9curiser votre site<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Notes pour trouver des failles de s\u00e9curit\u00e9 - S\u00e9curiser votre site\" \/>\n<meta property=\"og:description\" content=\"subfinder -d disney.com -silent -all \u00c0 httpx -silent -threads 100 | nuclei -id CVE-2022-26138 -v fuxploider : file upload vulnerability scanner and exploitation tool &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; If you want to bypass endpoint always to use own methodology. Example: Http Header based bypass: 1. X Original URL: \/redact Example: GET \/api\/getUser HTTP\/1.1 -&gt; 403 Host: redact.com GET \/ HTTP\/1.1 Host: redact.com X Original URL: \/api\/getUser -&gt; 200 OK 2. Referer: https:\/\/site.com\/api\/redact Example: GET \/api\/getUser HTTP\/1.1 -&gt; access denied Host: redact.com GET \/ HTTP\/1.1 Host: redact.com Referer: https:\/\/site.com\/api\/getUser \u2014&gt; 200 OK or GET \/api\/getUser HTTP\/1.1 Host: redact.com Referer: https:\/\/site.com\/api\/getUser -&gt; 200 OK &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"S\u00e9curiser votre site\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-30T17:04:53+00:00\" \/>\n<meta name=\"author\" content=\"Germain\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Germain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/\",\"url\":\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/\",\"name\":\"Notes pour trouver des failles de s\u00e9curit\u00e9 - S\u00e9curiser votre site\",\"isPartOf\":{\"@id\":\"https:\/\/www.searchevolution.com\/security\/#website\"},\"datePublished\":\"2022-07-30T17:04:53+00:00\",\"dateModified\":\"2022-07-30T17:04:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.searchevolution.com\/security\/#\/schema\/person\/e1318e0782dc5a7d6b03471347f881d8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.searchevolution.com\/security\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Notes pour trouver des failles de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.searchevolution.com\/security\/#website\",\"url\":\"https:\/\/www.searchevolution.com\/security\/\",\"name\":\"S\u00e9curiser votre site\",\"description\":\"Conna\u00eetre son ennemi\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.searchevolution.com\/security\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.searchevolution.com\/security\/#\/schema\/person\/e1318e0782dc5a7d6b03471347f881d8\",\"name\":\"Germain\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.searchevolution.com\/security\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a203854efbec130dd49471ccbba1abc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a203854efbec130dd49471ccbba1abc?s=96&d=mm&r=g\",\"caption\":\"Germain\"},\"sameAs\":[\"https:\/\/www.searchevolution.com\/security\"],\"url\":\"https:\/\/www.searchevolution.com\/security\/author\/germain\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Notes pour trouver des failles de s\u00e9curit\u00e9 - S\u00e9curiser votre site","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/","og_locale":"fr_CA","og_type":"article","og_title":"Notes pour trouver des failles de s\u00e9curit\u00e9 - S\u00e9curiser votre site","og_description":"subfinder -d disney.com -silent -all \u00c0 httpx -silent -threads 100 | nuclei -id CVE-2022-26138 -v fuxploider : file upload vulnerability scanner and exploitation tool &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; If you want to bypass endpoint always to use own methodology. Example: Http Header based bypass: 1. X Original URL: \/redact Example: GET \/api\/getUser HTTP\/1.1 -> 403 Host: redact.com GET \/ HTTP\/1.1 Host: redact.com X Original URL: \/api\/getUser -> 200 OK 2. Referer: https:\/\/site.com\/api\/redact Example: GET \/api\/getUser HTTP\/1.1 -> access denied Host: redact.com GET \/ HTTP\/1.1 Host: redact.com Referer: https:\/\/site.com\/api\/getUser \u2014> 200 OK or GET \/api\/getUser HTTP\/1.1 Host: redact.com Referer: https:\/\/site.com\/api\/getUser -> 200 OK &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;","og_url":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/","og_site_name":"S\u00e9curiser votre site","article_published_time":"2022-07-30T17:04:53+00:00","author":"Germain","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Germain","Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/","url":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/","name":"Notes pour trouver des failles de s\u00e9curit\u00e9 - S\u00e9curiser votre site","isPartOf":{"@id":"https:\/\/www.searchevolution.com\/security\/#website"},"datePublished":"2022-07-30T17:04:53+00:00","dateModified":"2022-07-30T17:04:53+00:00","author":{"@id":"https:\/\/www.searchevolution.com\/security\/#\/schema\/person\/e1318e0782dc5a7d6b03471347f881d8"},"breadcrumb":{"@id":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.searchevolution.com\/security\/2022\/07\/30\/notes-pour-trouver-des-failles-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.searchevolution.com\/security\/"},{"@type":"ListItem","position":2,"name":"Notes pour trouver des failles de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.searchevolution.com\/security\/#website","url":"https:\/\/www.searchevolution.com\/security\/","name":"S\u00e9curiser votre site","description":"Conna\u00eetre son ennemi","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.searchevolution.com\/security\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.searchevolution.com\/security\/#\/schema\/person\/e1318e0782dc5a7d6b03471347f881d8","name":"Germain","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.searchevolution.com\/security\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6a203854efbec130dd49471ccbba1abc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a203854efbec130dd49471ccbba1abc?s=96&d=mm&r=g","caption":"Germain"},"sameAs":["https:\/\/www.searchevolution.com\/security"],"url":"https:\/\/www.searchevolution.com\/security\/author\/germain\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/posts\/1012"}],"collection":[{"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/comments?post=1012"}],"version-history":[{"count":6,"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/posts\/1012\/revisions"}],"predecessor-version":[{"id":1018,"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/posts\/1012\/revisions\/1018"}],"wp:attachment":[{"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/media?parent=1012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/categories?post=1012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.searchevolution.com\/security\/wp-json\/wp\/v2\/tags?post=1012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}