File Upload, Code Execution, LFI, RFI, SQLi, XSS
File Upload, Code Execution, LFI, RFI, SQLi, XSS
File Upload, Code Execution, LFI, RFI, SQLi, XSS
Proxy
uest
ied Req Req
if uest
Mod
Html
Website
Response
195.44.2.1
Web Server
Intercepting Requests
Burp Proxy
Proxy
uest
ied Req Req
if uest
Mod Html Website
+ Client Side
Filtering
Response
195.44.2.1
Web Server
Mitigation
File Upload Vulns
Char Result
● Minimize the usage of user input on html. & → &
● Escape any untrusted input before inserting it < → <
into the page. > → >
" → "
' → '
/ → /
→https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
Brute Force & Dictionary Attacks
2. Dictionary Attacks
Use a wordlist, try every password in the list only.
Creating a Wordlist
Crunch can be used to create a wordlist.
Syntax:
> crunch [min] [max] [characters] -t [pattern] -o [FileName]
Example:
> crunch 6 8 123abc$ -i wordlist -t a@@@@b
Generated passes:
aaaaab
aabbbb
aan$$b
……...
Hydra
Hydra is a bruteforce tool that can be used to bruteforce almost any
authentication service.
Syntax:
> hydra [IP] -L [usernames] -P [passwords] [service]
Example:
> hydra 10.20.14.212 -l admin -P /root/wordlist.txt http-post-form
"/mutillidae/?page=login.php:username=^USER^&password=^PASS^&lo
gin-php-submit-button=Login:F=Not Logged In"