This media is not supported in your browser
VIEW IN TELEGRAM
๐Fuzzing and Bypassing the AWS WAF to trigger XSS๐
๐Tool - https://lnkd.in/gk4-_4yw
๐Blog - https://lnkd.in/g4W7eA7R
๐Tool - https://lnkd.in/gk4-_4yw
๐Blog - https://lnkd.in/g4W7eA7R
โค4๐ฅ2๐1
Bug Bounty Checklist and Cheatsheets
WAPT-https://github.com/KathanP19/HowToHunt/blob/master/CheckList/Web_Checklist_by_Chintan_Gurjar.pdf
Authenication-https://github.com/HolyBugx/HolyTips/blob/main/Checklist/Authentication.pdf
Oauth Misconfiguration-https://binarybrotherhood.io/oauth2_threat_model.html
File Upload-https://github.com/HolyBugx/HolyTips/blob/main/Checklist/File%20Upload.pdf
IDOR-https://notion.so/IDOR-Attack-vectors-exploitation-bypasses-and-chains-0b73eb18e9b640ce8c337af83f397a6b
XSS-https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
SQLi-https://portswigger.net/web-security/sql-injection/cheat-sheet
XXE-https://link.medium.com/lprTDcXRYgb
SSRF-https://0xn3va.gitbook.io/cheat-sheets/web-application/server-side-request-forgery
2FA-https://drive.google.com/file/d/11FlzxlVw4GIZ60s5v3I1S5p8kXZHExFT/view
CORS-https://0xn3va.gitbook.io/cheat-sheets/web-application/cors-misconfiguration
Business Logic Flaws-https://link.medium.com/MX5hzfESYgb
CSRF-https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery
Insecure deserialization-https://thehackerish.com/insecure-deserialization-explained-with-examples/
Web Cache Poisoning-https://0xn3va.gitbook.io/cheat-sheets/web-application/web-cache-poisoning
HTTP request smuggling-https://portswigger.net/web-security/request-smuggling/finding
Command Injection-https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
SAML-https://github.com/e11i0t4lders0n/SAML-SSO
Race Condition-https://pandaonair.com/2020/06/11/race-conditions-exploring-the-possibilities.html
S3 Bucket Misconfiguration-https://medium.com/@janijay007/s3-bucket-misconfiguration-from-basics-to-pawn-6893776d1007
Server-Side Template Injection-https://portswigger.net/research/server-side-template-injection
WebSockets Vulnerabilities-https://portswigger.net/web-security/websockets#intercepting-and-modifying-websocket-messages
WAPT-https://github.com/KathanP19/HowToHunt/blob/master/CheckList/Web_Checklist_by_Chintan_Gurjar.pdf
Authenication-https://github.com/HolyBugx/HolyTips/blob/main/Checklist/Authentication.pdf
Oauth Misconfiguration-https://binarybrotherhood.io/oauth2_threat_model.html
File Upload-https://github.com/HolyBugx/HolyTips/blob/main/Checklist/File%20Upload.pdf
IDOR-https://notion.so/IDOR-Attack-vectors-exploitation-bypasses-and-chains-0b73eb18e9b640ce8c337af83f397a6b
XSS-https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
SQLi-https://portswigger.net/web-security/sql-injection/cheat-sheet
XXE-https://link.medium.com/lprTDcXRYgb
SSRF-https://0xn3va.gitbook.io/cheat-sheets/web-application/server-side-request-forgery
2FA-https://drive.google.com/file/d/11FlzxlVw4GIZ60s5v3I1S5p8kXZHExFT/view
CORS-https://0xn3va.gitbook.io/cheat-sheets/web-application/cors-misconfiguration
Business Logic Flaws-https://link.medium.com/MX5hzfESYgb
CSRF-https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery
Insecure deserialization-https://thehackerish.com/insecure-deserialization-explained-with-examples/
Web Cache Poisoning-https://0xn3va.gitbook.io/cheat-sheets/web-application/web-cache-poisoning
HTTP request smuggling-https://portswigger.net/web-security/request-smuggling/finding
Command Injection-https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
SAML-https://github.com/e11i0t4lders0n/SAML-SSO
Race Condition-https://pandaonair.com/2020/06/11/race-conditions-exploring-the-possibilities.html
S3 Bucket Misconfiguration-https://medium.com/@janijay007/s3-bucket-misconfiguration-from-basics-to-pawn-6893776d1007
Server-Side Template Injection-https://portswigger.net/research/server-side-template-injection
WebSockets Vulnerabilities-https://portswigger.net/web-security/websockets#intercepting-and-modifying-websocket-messages
๐10๐ฅ4โค3
๐Find Waybackurls JS Endpoints With 1-Click๐
1. Add a Blank Bookmark on your browser.
2. Add this Regex in URL Section.
3. Now open any site and click on your bookmark!
1. Add a Blank Bookmark on your browser.
2. Add this Regex in URL Section.
javascript:(function() { var currentURL = encodeURIComponent(window.location.hostname.replace(/^www\./, '')); var newURL = 'https://web.archive.org/cdx/search/cdx?url=%27 + currentURL; window.open(newURL, %27_blank%27);})();3. Now open any site and click on your bookmark!
โค13๐ฅ3๐1
๐ FREE Exam Voucher ISC2 CC ๐
โ Exam Voucher:CC1M12312024
โ Link https://www.isc2.org/landing/1mcc
โ Exam Voucher:
โ Link https://www.isc2.org/landing/1mcc
โค5
๐จSubprober๐จ
๐Subprober is a powerful and efficient subdomain scanning tool๐
๐ฅ https://github.com/sanjai-AK47/Subprober
๐Subprober is a powerful and efficient subdomain scanning tool๐
๐ฅ https://github.com/sanjai-AK47/Subprober
๐7๐ฅ2
Cache Poisoning and Cache Deception.pdf
567.6 KB
References-->
https://portswigger.net/web-security/web-cache-poisoning
https://portswigger.net/web-security/web-cache-poisoning/exploiting#using-web-cache-poisoning-to-exploit-cookie-handling-vulnerabilities
https://hackerone.com/reports/593712
https://youst.in/posts/cache-poisoning-at-scale/
https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9
https://portswigger.net/web-security/web-cache-poisoning
https://portswigger.net/web-security/web-cache-poisoning/exploiting#using-web-cache-poisoning-to-exploit-cookie-handling-vulnerabilities
https://hackerone.com/reports/593712
https://youst.in/posts/cache-poisoning-at-scale/
https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9
๐ฅ6โค5๐2
๐Dons Js Scanner๐
๐Dons Js Scanner is a Python tool designed by Ali Essam to scan websites and uncover potential sensitive information within JavaScript files. It utilizes asynchronous programming for efficient web crawling and in-depth analysis.Dons Js Scanner is a Python tool designed by Ali Essam to scan websites and uncover potential sensitive information within JavaScript files. It utilizes asynchronous programming for efficient web crawling and in-depth analysis.
๐https://github.com/dragonked2/Dons
๐Dons Js Scanner is a Python tool designed by Ali Essam to scan websites and uncover potential sensitive information within JavaScript files. It utilizes asynchronous programming for efficient web crawling and in-depth analysis.Dons Js Scanner is a Python tool designed by Ali Essam to scan websites and uncover potential sensitive information within JavaScript files. It utilizes asynchronous programming for efficient web crawling and in-depth analysis.
๐https://github.com/dragonked2/Dons
โค7๐3๐1๐ฅ1๐1
This media is not supported in your browser
VIEW IN TELEGRAM
๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ข๐ง๐ ๐๐๐๐ ๐๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐ฌ ๐ฎ๐ฌ๐ข๐ง๐ ๐๐ฎ๐ซ๐ฉ ๐๐๐ฉ๐๐๐ญ๐๐ซ ๐๐ซ๐จ๐ฎ๐ฉ๐ฌ ๐
Race condition vulnerabilities abuse the server's (improper) way of handling concurrent requests.
These vulnerabilities can be used to perform limit-overrun attacks such as:
- using the same gift card multiple times
- redeeming the same coupon code
- bypassing a shop's quantity limits (nvidia video cards ๐)
How to check for race condition vulns
1. Find the request that triggers the server-side check
2. Create a new tab group in Repeater
3. Add the same request multiple times to the group (CTRL+R)
4. Select "Send group in parallel"
5. Run the attack
6. Check if more than one response is valid
*
Credit- Andrei Agape
Lab: https://portswigger.net/web-security/race-conditions/lab-race-conditions-limit-overrun
Article: https://portswigger.net/research/smashing-the-state-machine
Race condition vulnerabilities abuse the server's (improper) way of handling concurrent requests.
These vulnerabilities can be used to perform limit-overrun attacks such as:
- using the same gift card multiple times
- redeeming the same coupon code
- bypassing a shop's quantity limits (nvidia video cards ๐)
How to check for race condition vulns
1. Find the request that triggers the server-side check
2. Create a new tab group in Repeater
3. Add the same request multiple times to the group (CTRL+R)
4. Select "Send group in parallel"
5. Run the attack
6. Check if more than one response is valid
*
Credit- Andrei Agape
Lab: https://portswigger.net/web-security/race-conditions/lab-race-conditions-limit-overrun
Article: https://portswigger.net/research/smashing-the-state-machine
โค8๐6๐ฅ4