Web Attacks
LFI:
cat /etc/passwd
cat service config files
Upload a reverse shell and locate it
Chain with file upload (FTP/Redis/Web console)
Check /etc/knockd
/proc/self/environ (shell in user-agent)
Apache log poisoning (shell in user-agent)
CSRF
Try to test POST to GET conversion and vice versa
Send GET link for sensitive action in any form that goes to another user
Generate CSRF PoC and upload
SQLi:
Pentestmonkey cheatsheet
Try admin'# (valid username, see netsparker sqli cheatsheet)
Try abcd' or 1=1;--
Use UNION SELECT null,null,.. instead of 1,2,.. to avoid type conversion errors
For mssql,
xp_cmdshell
Use concat for listing 2 or more column data in one
For mysql,
udf
See banzai for UDF exploit issues
try a' or 1='1 -- -
A' union select "" into outfile "C:\xampp\htdocs\run.php" -- -'
SSRF:
Try to open other subdomains
Bypass restrictions with case switching
Use other protocols, file://, ftp (single line http like auth and access, ftp://user:pass@server/path
Try inline meta chars $(),`
Creds:
Default username/passwords
Username as default password as service name
Default username and password bruteforce
Password reuse
Null password
Check config files
Generate custom wordlist with cewl (--with-numbers)
Use hashcat rules if hints point to it, (-r rule_path, best64 should work)
File Upload:
Change mime type
Add image headers
Add payload in exiftool comment and name file as file.php.png
SSTI:
Identify with tplmap.py
Use SSTI -> RCE
Use SSTI chart to identify template engine
Last updated