My Concept

reflix -l urls.txt -w /home/bugbounty-wordlists/raft-large-words-lowercase.txt -X GET,POST -H "User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:145.0) Gecko/20100101 Firefox/145.0" -o t.txt -po params.txt -c 15 -hd -p nexovir -d --dom --heavy -xt

Find Generic Vulnerabilities

./xray_linux_amd64 ws --basic https://www.webucate.in --plugin xss,sqldet,cmd-injection,path-traversal,redirect
for i in $(cat target.txt); do ./xray_linux_amd64 ws --basic-crawler $i --plugins xss,sqldet,cmd-injection,redirect,path-traversal --html-output "$(date +%T).html"; done

Find Broken Access Control

  1. Numbers of Web Assets in scope.

  2. Filter with httpx.

Select Unauthenticated Domains
cat livesubdomains.txt | httpx -mc 403 -title -sc -td -server -location && cat livesubdomains.txt | httpx -mc 401 -title -sc -td -server -location
  1. After filtering, select an unauthenticated web application.

  2. Fuzzing Directories with FFUF.

  3. Most of the results 302 Redirect.

  4. Run FFUF again with size filter.

  5. Few Results came.

  6. One of the result 302 Redirect -> /directory, when open it leads to /directory/v1/endpoint.svc

  7. Use the Wsdler Burp extension to enumerate the endpoints.

  8. Multiple endpoints execute successfully without authorization.

✅ Use the -fs filter in FFUF to exclude responses with the same size, making it easier to spot unique and interesting findings.

Find OS Command Injection

XSS Hunting

1
2
3
4
5

----------------------------------------------------

Find XSS on GET and POST Parameters

----------------------------------------------------

Bruteforce Method - Find Hidden Endpoints and then Prameters

6
7
8
9

----------------------------------------------------

Find Hidden Prameters on Bruteforced Endpoints

10
11
12

----------------------------------------------------

Find Hidden endpoints in JS Files for then Bruteforce Prameters

13
14
15
16

curl -s https://www.pcmmod.com/js/utils/web_calls.js | grep -aoP "(?<=("|'|`))/[a-zA-Z0-9_?&=/-#.]*(?=("|'|`))" | sort -u

17

--------------------------------------------------------

Find Hidden endpoints in robots.txt for Bruteforce Prameters

18
19
20
21

--------------------------------------------------------

Arjun Find Hidden Prameters on First Extention Endpoints

22
23
24
25

--------------------------------------------------------

26

x8 Find Hidden Prameters on Last Extention Endpoints

27
28
29
30

31

--------------------------------------------------------

32

Find Vulnerable Prameters via Google Dorking

33
34

--------------------------------------------------------

Try XSS Payload on other endpoints with Same Vulnerable Parameter

--------------------------------------------------------

35

Try XSS Vulnerable Endpoints in other Subdomains

36
37

--------------------------------------------------------

Exploit & Bypass XSS

38

Find Open Redirect

39
40
41
42
43
44

Find Secrets and Endpoints in JS files

45
46
47

Find Sensitive Endpoints

48

Misconfiguration checks

49

Chek Improper Access Controll

  • Run Fuzzing with feroxbuster

  • Extract Domains

  • Run Arjun On All Endpoints

  • Run x8 On All Endpoints with Assetnote parameters wordlist

  • https://xss.report/dashboard swagpk Synack@3434

  • https://bxsshunter.com/dashboard Synack@3434

Check with wordlist

Check All Paths

Last updated