From e3b5eaf747418fc757e87b94a47032eafb6e68fa Mon Sep 17 00:00:00 2001 From: whx Date: Tue, 28 Mar 2023 21:30:56 +0200 Subject: [PATCH] added stuff --- Exploits/Databases/NodeJS-SQL-Injection.md | 10 ++++ Miscellaneous/Atomic Read Team.md | 56 ++++++++++++++++++++++ README.md | 11 +---- 3 files changed, 67 insertions(+), 10 deletions(-) create mode 100644 Exploits/Databases/NodeJS-SQL-Injection.md create mode 100644 Miscellaneous/Atomic Read Team.md diff --git a/Exploits/Databases/NodeJS-SQL-Injection.md b/Exploits/Databases/NodeJS-SQL-Injection.md new file mode 100644 index 0000000..9913ed4 --- /dev/null +++ b/Exploits/Databases/NodeJS-SQL-Injection.md @@ -0,0 +1,10 @@ +# NodeJS SQL Injections + +* [Stackhawk's article]( https://www.stackhawk.com/blog/node-js-sql-injection-guide-examples-and-prevention/) shows how to do SQL injection in nodejs + +```sh +username=admin&password[password]=1 +``` + +#TBD + diff --git a/Miscellaneous/Atomic Read Team.md b/Miscellaneous/Atomic Read Team.md new file mode 100644 index 0000000..2f1412f --- /dev/null +++ b/Miscellaneous/Atomic Read Team.md @@ -0,0 +1,56 @@ +# Atomic Red Team + +https://github.com/redcanaryco/atomic-red-team + +## Structure + +YAML files are used to describe a specific attack, which then can be replayed. Automatically most of the time. +These scenarios are used for testing purposes. + +## Atomic Red Team for Powershell + +* [Invoke-AtomicRedTeam](https://github.com/redcanaryco/invoke-atomicredteam/wiki) + +Cmdlets are `Invoke-AtomicRedTeam` and `Invoke-AtomicTest`. + + +Import the module +```powershell +powershell -ExecutionPolicy bypass +Import-Module Invoke-AtomicRedTeam.psd1 -Force +$PSDefaultParameterValues = @{"Invoke-AtomicTest:PathToAtomicsFolder"="C:\Users\Administrator\Desktop\atomics"} +``` + +### Invoke-AtomicTest + +Use `Invoke-AtomicTest` +```sh +Invoke-AtomicTest -ShowDetailsBrief +Invoke-AtomicTest -ShowDetails +``` + +Check if prerequisites are available +```sh +Invoke-AtomicTest -GetPreReqs +``` + + +Multiple techniques can be executed through the following line +```sh +'T', 'T', 'T' | ForEach-Object {echo "Enumerating Tactic $_"; Invoke-AtomicTest $_ -showDetails} +``` + +Use `-cleanup` to revert the changes. Use `-promptForInputArgs` to set variables interactively. + +### Argument Customization + +Customize arguments of a test execution via +```sh +$customArgs=@{"user" = "username"; "password" = "securepassword"} +Invoke-AtomicTest T- -InputArgs $customArgs +``` + +### AtomicGUI + +There is a web application that can be started via `Start-AtomicGUI` to create new atomic rules. + diff --git a/README.md b/README.md index 7080d9c..aaadb34 100644 --- a/README.md +++ b/README.md @@ -67,14 +67,5 @@ Authorized audit of security systems of computers and networks. * [OSSTMM3](https://www.isecom.org/OSSTMM.3.pdf) * [NIST](https://www.nist.gov/cyberframework) * [CAF](https://www.ncsc.gov.uk/collection/caf/caf-principles-and-guidance) +* [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team) as a practical approach -## Testing Webapps - -* Two methods -1. Every Page and its functions one by one -2. Test by stages - * Authorization - * Authentication - * Injection - * Client Side Controls - * Application Logic