Chapter 3 - Exploiting Vulnerabilities

Finding Exploits

Search Exploit-DB

Kali> searchsploit windows 2003 | grep -i local

To quickly view the exploit

Kali> searchsploit -x ######.py

Search Google

Google> site:exploit-db.com exploit kernel <= 3

Search Metasploit

Kali> grep -R "W7" /usr/share/metasploit-framework/modules/exploit/windows/*

Search Vulners

Vulners Auditarrow-up-right

Compiling Exploits

Compile for Windows

Compile for Architectures

Catching Exploits

Breaking out of Virtualization

Breaking into the Data Centrearrow-up-right

VENOM Vulnerabilityarrow-up-right

WebSockets

Hacking with WebSockets HTML5arrow-up-right

IPV6

Penetration testing with IPv6arrow-up-right

How to pwn things with IPv6arrow-up-right

HTTP

Resources

OWASP AppSec Videosarrow-up-right

OWASP Testing Guidearrow-up-right

Cracking the Lens: Attacking HTTPs hidden attack surfacearrow-up-right

How I hacked hundreds of companies through their helpdeskarrow-up-right

Headers

Find what request methods the web server supports Add the following into your Burp repeater

Send fake IP

Webshells

PHP CMD Shell

Place in body of a PUT request and give it a file name

Usage:

http://victim/directory/shell.php?cmd=whoamiarrow-up-right

Resources

XXE

Resources

Exploitation: XML External Entity (XXE) Injectionarrow-up-right

Exploiting a Real-World XXE Vulnerabilityarrow-up-right

Exploiting XXE Vulnerabilities in file parsingarrow-up-right

XSS

Resources

XSS Attack: Busting browsers to rootarrow-up-right

DOM Clobberingarrow-up-right

DOM Flow - Untangling the DOMarrow-up-right

CORS

Resources

Exploiting Misconfigured CORSarrow-up-right

CSRF

Resources

Computerphile: Cross Site Request Forgeryarrow-up-right

Updating Anti-CSRF Tokens with BurpSuitearrow-up-right

SSRF

Resources

What is Server side Request Forgery?arrow-up-right

A New Era of SSRFarrow-up-right

Exploiting Server Side Request Forgery on a Node/Express Application (hosted on Amazon EC2)arrow-up-right

Example

Sometimes what appears to be RFI can lead to SSRF, here are some commands to help

RCE

Resources

Node.js Remote Code Execution as a Servicearrow-up-right

Exploiting Python code execution in the webarrow-up-right

Big List of Naughty Stringsarrow-up-right

PHP Generic Gadget Chainsarrow-up-right

Utilizing Code Re-use or ROP in PHP Exploitsarrow-up-right

Pwning PHP Mail Function for fun and RCEarrow-up-right

Server Side Template Injection

Resources

Server Side Template Injectionarrow-up-right

Server Side Template Injection: RCE for the Modern WebApparrow-up-right

API

Resources

Cracking & Fixing REST APIsarrow-up-right

LFI

Resources

Local File Inclusion Testing Techniquesarrow-up-right

Insecure PHP Functions & their Exploits (LFI/RFI)arrow-up-right

LFI and RFI -- The Website Security Vulnerabilityarrow-up-right

Local File Inclusion to Remote Code Executionarrow-up-right

Local File Inclusion to Remote Code Execution Advanced Exploitation PROC Shortcutsarrow-up-right

Examples

Open Redirects

Resources

Open URL Redirectsarrow-up-right

RFI

Padding Oracle Attack

Resources

Automated Padding Oracle Attacks with Padbusterarrow-up-right

Arguments

Examples

AWS

Resources

AWS PENETRATION TESTING PART 1. S3 BUCKETSarrow-up-right

File Upload

Make a backdoor GIF

Upload From CLI

E-Mail

Resources

How to Bypass E-Mail gateways using common payloadsarrow-up-right

iSCSI

Resources

An interesting route to domain admin via ISCSIarrow-up-right

Databases

MySQL

Resources

SQL Injectionarrow-up-right

SQLMap tricks for advanced SQL injecitonarrow-up-right

Examples

MSSQL

Resources

PenTest & Hack MSSQLarrow-up-right

SQL Injection Cheatsheet MSSQLarrow-up-right

MongoDB

Resources

NoSQL Maparrow-up-right

Examples

PBX

Resources

Pentesting VOIParrow-up-right

Introduction to Telephony and PBXarrow-up-right

Examples

Last updated