πŸ’‘My Information Disclosure Methodology

-------------------------------------------------------------

(1) One-Liner Information Disclosure Finding

cat subdomains.txt | waybackurls | httpx -mc 200 -ct | grep application/json

-------------------------------------------------------------

(2) One-Liner π™€π™­π™©π™§π™–π™˜π™© π™Žπ™šπ™£π™¨π™žπ™©π™žπ™«π™š π™žπ™£π™›π™€π™§π™’π™–π™©π™žπ™€π™£π™¨ 𝙛𝙧𝙀𝙒 π™…π™Ž π™π™žπ™‘π™šπ™¨

echo TARGET.com | gau | grep ".js" | httpx -content-type | grep 'application/javascript' | awk '{print $1}' | nuclei -t /root/nuclei-templates/exposures/ -silent > secrets.txt

-------------------------------------------------------------

Session Hijacking testing steps

  1. Login your account

  2. Use cookie editor extension in browser

  3. Copy all the target cookies

  4. Logout your account

  5. Paste that cookies in cookie editor extension

  6. Refresh page if you are logged in then this is a session hijacking

-------------------------------------------------------------

1- https://ahrefs.com/broken-link-checker…

2- https://deadlinkchecker.com

3- https://brokenlinkcheck.com

-------------------------------------------------------------

Some ways to bypass 403

1- Using space symbols

exmaple: /admin -> 403

/admin%09 -> 200

/admin%20 -> 200

2- use traversal Example:

/admin -> 403

/..;/admin -> 200

You can fuzz with traversal sometimes that end with results

Example: /..;/FUZZ

-------------------------------------------------------------

Last updated