Chapter 3 - Exploiting Vulnerabilities
Finding Exploits
Search Exploit-DB
Kali> searchsploit windows 2003 | grep -i localTo quickly view the exploit
Kali> searchsploit -x ######.pySearch Google
Google> site:exploit-db.com exploit kernel <= 3Search Metasploit
Kali> grep -R "W7" /usr/share/metasploit-framework/modules/exploit/windows/*Search Vulners
Compiling Exploits
Compile for Windows
Compile for Architectures
Catching Exploits
Breaking out of Virtualization
WebSockets
IPV6
HTTP
Resources
Cracking the Lens: Attacking HTTPs hidden attack surface
How I hacked hundreds of companies through their helpdesk
Headers
Find what request methods the web server supports Add the following into your Burp repeater
Send fake IP
Webshells
PHP CMD Shell
Place in body of a PUT request and give it a file name
Usage:
http://victim/directory/shell.php?cmd=whoami
Resources
XXE
Resources
Exploitation: XML External Entity (XXE) Injection
Exploiting a Real-World XXE Vulnerability
Exploiting XXE Vulnerabilities in file parsing
XSS
Resources
XSS Attack: Busting browsers to root
CORS
Resources
CSRF
Resources
Computerphile: Cross Site Request Forgery
Updating Anti-CSRF Tokens with BurpSuite
SSRF
Resources
What is Server side Request Forgery?
Exploiting Server Side Request Forgery on a Node/Express Application (hosted on Amazon EC2)
Example
Sometimes what appears to be RFI can lead to SSRF, here are some commands to help
RCE
Resources
Node.js Remote Code Execution as a Service
Exploiting Python code execution in the web
Utilizing Code Re-use or ROP in PHP Exploits
Pwning PHP Mail Function for fun and RCE
Server Side Template Injection
Resources
Server Side Template Injection
Server Side Template Injection: RCE for the Modern WebApp
API
Resources
LFI
Resources
Local File Inclusion Testing Techniques
Insecure PHP Functions & their Exploits (LFI/RFI)
LFI and RFI -- The Website Security Vulnerability
Local File Inclusion to Remote Code Execution
Local File Inclusion to Remote Code Execution Advanced Exploitation PROC Shortcuts
Examples
Open Redirects
Resources
RFI
Padding Oracle Attack
Resources
Automated Padding Oracle Attacks with Padbuster
Arguments
Examples
AWS
Resources
AWS PENETRATION TESTING PART 1. S3 BUCKETS
File Upload
Make a backdoor GIF
Upload From CLI
E-Mail
Resources
How to Bypass E-Mail gateways using common payloads
iSCSI
Resources
An interesting route to domain admin via ISCSI
Databases
MySQL
Resources
SQLMap tricks for advanced SQL injeciton
Examples
MSSQL
Resources
SQL Injection Cheatsheet MSSQL
MongoDB
Resources
Examples
PBX
Resources
Introduction to Telephony and PBX
Examples
Last updated
Was this helpful?