mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-27 19:16:08 -04:00
websecurity
This commit is contained in:
parent
0a30e5e40e
commit
c8705de960
@ -49,6 +49,7 @@ $ wget -rck <TARGET-WEBSITE>
|
||||
|
||||
```
|
||||
$ /wget -r -l1 -H -t1 -nd -N -nd -N -A.swf -erobots=off <WEBSITE> -i output_swf_files.txt
|
||||
```
|
||||
|
||||
* Once we have identified and downloaded *.swf files, we must analyze the code, the functions (as *loadMovie*) variables in order to identify those that call and allow other types of vulnerabilities such as cross site scripting. Below shows some vulnerable functions:
|
||||
|
||||
@ -72,7 +73,7 @@ ExternalInterface.addCallback
|
||||
SharedObject.getLocal, SharedObject.getRemote
|
||||
```
|
||||
|
||||
* authentication system: the first thing is to determine if the website stored the credentials in the browser. This could be exploited with attacks on defaults accounts and dictionary attacks. The default accounts are: admin, administrator, root, system, user, default, name application. We can use **hydra** for this:
|
||||
* authentication system: the first thing is to determine if the website stored the credentials in the browser. This could be exploited with attacks on defaults accounts and dictionary attacks. The default accounts are: admin, administrator, root, system, user, default, name application. We can use **hydra** for this:
|
||||
|
||||
```
|
||||
$ hydra -L users.txt -P pass.txt <WEBSTE> http-head/private
|
||||
|
Loading…
x
Reference in New Issue
Block a user