mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-28 03:26:08 -04:00
some small fixes
This commit is contained in:
parent
69d06e13df
commit
a220272599
@ -173,6 +173,8 @@ $ python -c 'print "2f722f6e6574736563".decode("hex")'
|
|||||||
```
|
```
|
||||||
|
|
||||||
- Hex to ascii:
|
- Hex to ascii:
|
||||||
|
Hex character codes are simply the hexadecimal (base 16) numbers for the ASCII character set; that is, the number-to-letter representations which comprise virtually all computer text.
|
||||||
|
|
||||||
|
|
||||||
```
|
```
|
||||||
$ xxd -r -p <<< 2f722f6e6574736563
|
$ xxd -r -p <<< 2f722f6e6574736563
|
||||||
@ -184,6 +186,14 @@ $ xxd -r -p <<< 2f722f6e6574736563
|
|||||||
'0b11110010101001010'
|
'0b11110010101001010'
|
||||||
```
|
```
|
||||||
|
|
||||||
|
#### Octal
|
||||||
|
(or: a great way of obscurating a URL)
|
||||||
|
|
||||||
|
Example: http://017700000001 --> 127.0.0.1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -2,26 +2,36 @@
|
|||||||
|
|
||||||
## OS Command Injection
|
## OS Command Injection
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
## SQLi
|
## SQLi
|
||||||
|
|
||||||
- Brute force password
|
- Brute force password
|
||||||
- Timed SQLi
|
- Timed SQLi
|
||||||
- Cookie force brute
|
- Cookie force brute
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
## PHP Shells
|
## PHP Shells
|
||||||
|
|
||||||
- php primer
|
- php primer
|
||||||
- xor
|
- xor
|
||||||
- exploits
|
- exploits
|
||||||
|
|
||||||
|
----
|
||||||
|
|
||||||
## Scanners
|
## Scanners
|
||||||
|
|
||||||
- heartbleed
|
- heartbleed
|
||||||
|
|
||||||
|
|
||||||
|
-----
|
||||||
## User ID
|
## User ID
|
||||||
- cookie auth
|
- cookie auth
|
||||||
- user id
|
- user id
|
||||||
|
|
||||||
|
----
|
||||||
|
|
||||||
## Other Resources
|
## Other Resources
|
||||||
|
|
||||||
#### When we have a Website/IP Address:
|
#### When we have a Website/IP Address:
|
||||||
@ -39,14 +49,58 @@
|
|||||||
- Inspect the DOM using the browser's developer tools to look for HTML comments (plain view-source won't work when the content is loaded through Ajax).
|
- Inspect the DOM using the browser's developer tools to look for HTML comments (plain view-source won't work when the content is loaded through Ajax).
|
||||||
|
|
||||||
|
|
||||||
|
-----
|
||||||
|
|
||||||
|
## URLs
|
||||||
|
|
||||||
|
#### Octal
|
||||||
|
|
||||||
|
- Example: http://017700000001 --> 127.0.0.1
|
||||||
|
|
||||||
|
- For example 206.191.158.50:
|
||||||
|
|
||||||
|
((206 * 256 + 191) * 256 + 158 ) * 256 + 50 = 3468664370.
|
||||||
|
|
||||||
|
Now, there is a further step that can make this address even more obscure. You can add to this dword number, any multiple of the quantity 4294967296 (2564)
|
||||||
|
|
||||||
|
|
||||||
#### Tools
|
#### Great @
|
||||||
|
|
||||||
|
-Everything between "http://" and "@" is completely irrelevant
|
||||||
|
|
||||||
|
```
|
||||||
|
http://doesn'tmatter@www.google.org
|
||||||
|
http://!$^&*()_+`-={}|[]:;@www.google.com
|
||||||
|
```
|
||||||
|
|
||||||
|
- @ symbol can be represented by its hex code %40
|
||||||
|
- dots are %2e
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
----
|
||||||
|
|
||||||
|
## HTTP
|
||||||
|
|
||||||
|
The first line of a request is modified to include protocol version information and it's followed by zero or more name:value pairs (headers):
|
||||||
|
- User-Agent: browser version information
|
||||||
|
- Host: URL hostanme
|
||||||
|
- Accept: supported MIME documents( such as text/plain or audio/MPEG)
|
||||||
|
- Accept-Language: supported language codes
|
||||||
|
- Referer: originating page for the request
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
-----
|
||||||
|
## Tools
|
||||||
|
|
||||||
- [Burp Suite]
|
- [Burp Suite]
|
||||||
- [FireBug] in Firefox
|
- [FireBug] in Firefox
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
-----------------
|
-----------------
|
||||||
[FireBug]: http://getfirebug.com/
|
[FireBug]: http://getfirebug.com/
|
||||||
[Burp Suite]: http://portswigger.net/burp/
|
[Burp Suite]: http://portswigger.net/burp/
|
||||||
|
Loading…
x
Reference in New Issue
Block a user