added stuff
This commit is contained in:
parent
f1668bdc2a
commit
e3b5eaf747
|
@ -0,0 +1,10 @@
|
||||||
|
# NodeJS SQL Injections
|
||||||
|
|
||||||
|
* [Stackhawk's article]( https://www.stackhawk.com/blog/node-js-sql-injection-guide-examples-and-prevention/) shows how to do SQL injection in nodejs
|
||||||
|
|
||||||
|
```sh
|
||||||
|
username=admin&password[password]=1
|
||||||
|
```
|
||||||
|
|
||||||
|
#TBD
|
||||||
|
|
|
@ -0,0 +1,56 @@
|
||||||
|
# Atomic Red Team
|
||||||
|
|
||||||
|
https://github.com/redcanaryco/atomic-red-team
|
||||||
|
|
||||||
|
## Structure
|
||||||
|
|
||||||
|
YAML files are used to describe a specific attack, which then can be replayed. Automatically most of the time.
|
||||||
|
These scenarios are used for testing purposes.
|
||||||
|
|
||||||
|
## Atomic Red Team for Powershell
|
||||||
|
|
||||||
|
* [Invoke-AtomicRedTeam](https://github.com/redcanaryco/invoke-atomicredteam/wiki)
|
||||||
|
|
||||||
|
Cmdlets are `Invoke-AtomicRedTeam` and `Invoke-AtomicTest`.
|
||||||
|
|
||||||
|
|
||||||
|
Import the module
|
||||||
|
```powershell
|
||||||
|
powershell -ExecutionPolicy bypass
|
||||||
|
Import-Module Invoke-AtomicRedTeam.psd1 -Force
|
||||||
|
$PSDefaultParameterValues = @{"Invoke-AtomicTest:PathToAtomicsFolder"="C:\Users\Administrator\Desktop\atomics"}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Invoke-AtomicTest
|
||||||
|
|
||||||
|
Use `Invoke-AtomicTest`
|
||||||
|
```sh
|
||||||
|
Invoke-AtomicTest <MITRE TacticNo.> -ShowDetailsBrief
|
||||||
|
Invoke-AtomicTest <MITRE TacticNo.> -ShowDetails
|
||||||
|
```
|
||||||
|
|
||||||
|
Check if prerequisites are available
|
||||||
|
```sh
|
||||||
|
Invoke-AtomicTest <MITRE TechniqueNo.> -GetPreReqs
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
Multiple techniques can be executed through the following line
|
||||||
|
```sh
|
||||||
|
'T<number>', 'T<number>', 'T<number>' | ForEach-Object {echo "Enumerating Tactic $_"; Invoke-AtomicTest $_ -showDetails}
|
||||||
|
```
|
||||||
|
|
||||||
|
Use `-cleanup` to revert the changes. Use `-promptForInputArgs` to set variables interactively.
|
||||||
|
|
||||||
|
### Argument Customization
|
||||||
|
|
||||||
|
Customize arguments of a test execution via
|
||||||
|
```sh
|
||||||
|
$customArgs=@{"user" = "username"; "password" = "securepassword"}
|
||||||
|
Invoke-AtomicTest T<number>-<Testnumber> -InputArgs $customArgs
|
||||||
|
```
|
||||||
|
|
||||||
|
### AtomicGUI
|
||||||
|
|
||||||
|
There is a web application that can be started via `Start-AtomicGUI` to create new atomic rules.
|
||||||
|
|
11
README.md
11
README.md
|
@ -67,14 +67,5 @@ Authorized audit of security systems of computers and networks.
|
||||||
* [OSSTMM3](https://www.isecom.org/OSSTMM.3.pdf)
|
* [OSSTMM3](https://www.isecom.org/OSSTMM.3.pdf)
|
||||||
* [NIST](https://www.nist.gov/cyberframework)
|
* [NIST](https://www.nist.gov/cyberframework)
|
||||||
* [CAF](https://www.ncsc.gov.uk/collection/caf/caf-principles-and-guidance)
|
* [CAF](https://www.ncsc.gov.uk/collection/caf/caf-principles-and-guidance)
|
||||||
|
* [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team) as a practical approach
|
||||||
|
|
||||||
## Testing Webapps
|
|
||||||
|
|
||||||
* Two methods
|
|
||||||
1. Every Page and its functions one by one
|
|
||||||
2. Test by stages
|
|
||||||
* Authorization
|
|
||||||
* Authentication
|
|
||||||
* Injection
|
|
||||||
* Client Side Controls
|
|
||||||
* Application Logic
|
|
||||||
|
|
Loading…
Reference in New Issue