Skip to content

Commit 2304101

Browse files
committed
Normalize page header for GraphQL, Deserialization, SCM
1 parent 2deb20a commit 2304101

File tree

21 files changed

+263
-130
lines changed

21 files changed

+263
-130
lines changed

Google Web Toolkit/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,17 @@
66
## Summary
77

88
* [Tools](#tools)
9-
* [Enumerate](#enumerate)
9+
* [Methodology](#methodology)
1010
* [References](#references)
1111

1212

1313
## Tools
1414

15-
* [FSecureLABS/GWTMap](https://github.com/FSecureLABS/GWTMap)
16-
* [GDSSecurity/GWT-Penetration-Testing-Toolset](https://github.com/GDSSecurity/GWT-Penetration-Testing-Toolset)
15+
* [FSecureLABS/GWTMap](https://github.com/FSecureLABS/GWTMap) - GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications.
16+
* [GDSSecurity/GWT-Penetration-Testing-Toolset](https://github.com/GDSSecurity/GWT-Penetration-Testing-Toolset) - A set of tools made to assist in penetration testing GWT applications.
1717

1818

19-
## Enumerate
19+
## Methodology
2020

2121
* Enumerate the methods of a remote application via it's bootstrap file and create a local backup of the code (selects permutation at random):
2222
```ps1

GraphQL Injection/README.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
- [Enumerate Database Schema via Suggestions](#enumerate-database-schema-via-suggestions)
1414
- [Enumerate the types' definition](#enumerate-the-types-definition)
1515
- [List path to reach a type](#list-path-to-reach-a-type)
16-
- [Exploit](#exploit)
16+
- [Methodology](#methodology)
1717
- [Extract data](#extract-data)
1818
- [Extract data using edges/nodes](#extract-data-using-edgesnodes)
1919
- [Extract data using projections](#extract-data-using-projections)
@@ -24,6 +24,7 @@
2424
- [Injections](#injections)
2525
- [NOSQL injection](#nosql-injection)
2626
- [SQL injection](#sql-injection)
27+
- [Labs](#labs)
2728
- [References](#references)
2829

2930

@@ -243,7 +244,7 @@ Found 27 ways to reach the "Skill" node from the "Query" node:
243244
```
244245
245246
246-
## Exploit
247+
## Methodology
247248
248249
### Extract data
249250
@@ -384,6 +385,19 @@ curl -X POST http://localhost:8080/graphql\?embedded_submission_form_uuid\=1%27%
384385
```
385386
386387
388+
## Labs
389+
390+
* [PortSwigger - Accessing private GraphQL posts](https://portswigger.net/web-security/graphql/lab-graphql-reading-private-posts)
391+
* [PortSwigger - Accidental exposure of private GraphQL fields](https://portswigger.net/web-security/graphql/lab-graphql-accidental-field-exposure)
392+
* [PortSwigger - Finding a hidden GraphQL endpoint](https://portswigger.net/web-security/graphql/lab-graphql-find-the-endpoint)
393+
* [PortSwigger - Bypassing GraphQL brute force protections](https://portswigger.net/web-security/graphql/lab-graphql-brute-force-protection-bypass)
394+
* [PortSwigger - Performing CSRF exploits over GraphQL](https://portswigger.net/web-security/graphql/lab-graphql-csrf-via-graphql-api)
395+
* [Root Me - GraphQL - Introspection](https://www.root-me.org/fr/Challenges/Web-Serveur/GraphQL-Introspection)
396+
* [Root Me - GraphQL - Injection](https://www.root-me.org/fr/Challenges/Web-Serveur/GraphQL-Injection)
397+
* [Root Me - GraphQL - Backend injection](https://www.root-me.org/fr/Challenges/Web-Serveur/GraphQL-Backend-injection)
398+
* [Root Me - GraphQL - Mutation](https://www.root-me.org/fr/Challenges/Web-Serveur/GraphQL-Mutation)
399+
400+
387401
## References
388402
389403
- [Building a free open source GraphQL wordlist for penetration testing - Nohé Hinniger-Foray - August 17, 2023](https://escape.tech/blog/graphql-security-wordlist/)

Headless Browser/README.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,19 @@
11
# Headless Browser
22

3-
A headless browser is a web browser without a graphical user interface. It works just like a regular browser, such as Chrome or Firefox, by interpreting HTML, CSS, and JavaScript, but it does so in the background, without displaying any visuals.
3+
> A headless browser is a web browser without a graphical user interface. It works just like a regular browser, such as Chrome or Firefox, by interpreting HTML, CSS, and JavaScript, but it does so in the background, without displaying any visuals.
44
5-
Headless browsers are primarily used for automated tasks, such as web scraping, testing, and running scripts. They are particularly useful in situations where a full-fledged browser is not needed, or where resources (like memory or CPU) are limited.
5+
> Headless browsers are primarily used for automated tasks, such as web scraping, testing, and running scripts. They are particularly useful in situations where a full-fledged browser is not needed, or where resources (like memory or CPU) are limited.
6+
7+
8+
## Summary
9+
10+
* [Headless Commands](#headless-commands)
11+
* [Local File Read](#local-file-read)
12+
* [Debugging Port ](#debugging-port)
13+
* [Network](#network)
14+
* [Port Scanning](#port-scanning)
15+
* [DNS Rebinding](#dns-rebinding)
16+
* [References](#references)
617

718

819
## Headless Commands

Hidden Parameters/README.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,13 @@
22

33
> Web applications often have hidden or undocumented parameters that are not exposed in the user interface. Fuzzing can help discover these parameters, which might be vulnerable to various attacks.
44
5+
56
## Summary
67

78
* [Tools](#tools)
8-
* [Exploit](#exploit)
9-
* [Bruteforce parameters](#bruteforce-parameters)
10-
* [Old parameters](#old-parameters)
9+
* [Methodology](#methodology)
10+
* [Bruteforce Parameters](#bruteforce-parameters)
11+
* [Old Parameters](#old-parameters)
1112
* [References](#references)
1213

1314

@@ -20,9 +21,9 @@
2021
* [devanshbatham/ParamSpider](https://github.com/devanshbatham/ParamSpider) - Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
2122

2223

23-
## Exploit
24+
## Methodology
2425

25-
### Bruteforce parameters
26+
### Bruteforce Parameters
2627

2728
* Use wordlists of common parameters and send them, look for unexpected behavior from the backend.
2829
```ps1
@@ -39,7 +40,7 @@ Wordlist examples:
3940
- [samlists/sam-cc-parameters-mixedcase-all.txt](https://github.com/the-xentropy/samlists/blob/main/sam-cc-parameters-mixedcase-all.txt)
4041
4142
42-
### Old parameters
43+
### Old Parameters
4344
4445
Explore all the URL from your targets to find old parameters.
4546

Insecure Deserialization/DotNET.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
1-
# .NET Serialization
1+
# .NET Deserialization
2+
3+
> .NET serialization is the process of converting an object’s state into a format that can be easily stored or transmitted, such as XML, JSON, or binary. This serialized data can then be saved to a file, sent over a network, or stored in a database. Later, it can be deserialized to reconstruct the original object with its data intact. Serialization is widely used in .NET for tasks like caching, data transfer between applications, and session state management.
4+
25

36
## Summary
47

0 commit comments

Comments
 (0)