- Start vm with tart
tart run archlinux --no-graphics --dir=shared:~/Sources --rosetta=ROSETTA- mount rosetta to Linux
sudo mkdir -p /mnt/rosetta
sudo mount -t virtiofs ROSETTA /mnt/rosetta| Vulnerability: Host Header Injection | |
| Product: Plesk Obsidian | |
| Version: 18.0.49 and below | |
| Tools: | |
| Burp Suite | |
| Mozilla Firefox (as a browser) | |
| (?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_k |
Rust has kind of a steep learning curve but fortunately the Rust community has created some amazing resources for it. The approach I have taken is an iterative one using the following five resorces.
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| hostname:target.com | to find all asset available for target.com on shodan | |
| http.title:"title" | to find server/host with similer title | |
| http.html:"/file" | to find server/host with similar path | |
| html:"context" | to find server/host with similar string | |
| server: "apache 2.2.3" | to find server/host with same server | |
| port:80 | to find server/host with same port | |
| os:"windows" | to find server/host with same os | |
| asn:AS3214 | to find host/server with matched asn | |
| http.status:200 | to find server/host with 200 http response code | |
| http.favicon.hash:"hash" | to find server/host with same favico hash |
| # tools from https://github.com/ibraheemdev/modern-unix | |
| tap "cantino/mcfly" | |
| tap "clementtsang/bottom" | |
| brew "bat" | |
| brew "exa" | |
| brew "lsd" | |
| brew "git-delta" | |
| brew "dust" | |
| brew "duf" | |
| brew "broot" |
Simply try to change the domain
Example: ?redirect=https://example.com --> ?redirect=https://evil.com
Bypass the filter when protocol is blacklisted using //
Example: ?redirect=https://example.com --> ?redirect=//evil.com
| var logger = console.trace; | |
| // ELEMENT | |
| ;(getElementByIdCopy => { | |
| Element.prototype.getElementById = function(q) { | |
| logger('getElementById', q, this, this.innerHTML); | |
| return Reflect.apply(getElementByIdCopy, this, [q]) | |
| } | |
| })(Element.prototype.getElementById) |