πŸ”₯OSCP TrainingπŸ”₯πŸ›‘βš”οΈπŸ‘¨πŸ»β€πŸ’»
8.1K subscribers
162 photos
1 video
27 files
64 links
Offensive Security Certified Professional
@WebHacking
@pfsense
@WifiHacking
πŸ”°For safer days
Download Telegram
Forwarded from WiFi Security
Aircrack-NG Cheat Sheet
πŸ‘12❀1
Github Dorks Cheatsheet

Find files with sensitive info, API Keys, Tokens and Passwords.

+ list of github dorks automation tools
πŸ‘14❀4πŸ€”3πŸ‘Ž1
Windows useful Directories
❀35πŸ‘15
Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion
❀13πŸ”₯5πŸ‘1
Periodical reminder: it's possible to navigate sub-tabs (like Repeater entries) from the keyboard.

You simply have to configure the actions "Go to previous tab" and "Go to next tab".

Burp Suite
As Burp Suite is developed in Java, regexes may use embedded flag expressions like "(?m)"

Here's a detailled description of all the possibilities (including embedded flags, character classes, quantifiers, groups, ...)
πŸ‘7❀2πŸŽ‰1
Bug Bounty Tip

GBK Encoding / MultiByte Attack

嘊 = %E5%98%8A = \u560a β‡’ %0A
嘍 = %E5%98%8D = \u560d β‡’ %0D
嘾 = %E5%98%BE = \u563e β‡’ %3E (>)
嘼 = %E5%98%BC = \u563c β‡’ %3C (<)
嘒 = %E5%98%A2 = \u5622 β‡’ %22 (')
嘧 = %E5%98%A7 = \u5627 β‡’ %27 (")

For XSS, CRLF, WAF bypass
❀6πŸ‘3
CSP Protection Bypass (using Google domain)

/o/oauth2/revoke?callback=alert(1);console.log
❀9πŸ”₯1
Useful for local privesc on Windows systems; find unquoted service path using the following:

wmic service get name,displayname,pathname,startmode |findstr /i "Auto" |findstr /i /v "C:\Windows\\" |findstr /i /v """

#OSCP #Windows
πŸ‘12