This is a simple guide to perform javascript recon in the bugbounty
- The first step is to collect possibly several javascript files (
more files
=more paths,parameters
->more vulns
)
// SPDX-License-Identifier: MIT | |
// OpenZeppelin Contracts v4.3.2 (token/ERC20/ERC20.sol) | |
pragma solidity ^0.8.0; | |
import "./IERC20.sol"; | |
import "./extensions/IERC20Metadata.sol"; | |
import "../../utils/Context.sol"; | |
/** |
0 | |
001 | |
002 | |
003 | |
01 | |
02 | |
03 | |
1 | |
2 | |
2014 |
#!/bin/bash | |
# Use this as initial axiom's script on reconftw.cfg file to copy config files to the fleet | |
axiom-scp ~/Tools/authorized_keys '*':/home/op/.ssh/authorized_keys | |
axiom-exec 'mkdir -p /home/op/.config/amass/ /home/op/Tools/ /home/op/.config/subfinder/ /home/op/.config/notify/' | |
axiom-scp ~/.config/amass/config.ini '*':/home/op/.config/amass/config.ini | |
axiom-scp ~/Tools/h8mail_config.ini '*':/home/op/Tools/h8mail_config.ini | |
axiom-scp ~/.config/subfinder/config.yaml '*':/home/op/.config/subfinder/config.yaml | |
axiom-scp ~/Tools/.github_tokens '*':/home/op/Tools/.github_tokens |
import http.server | |
import socketserver | |
from http import HTTPStatus | |
class Handler(http.server.SimpleHTTPRequestHandler): | |
def do_GET(self): | |
self.send_response(HTTPStatus.OK) | |
self.end_headers() | |
self.wfile.write(b'Hello world') |
// This injects a box into the page that moves with the mouse; | |
// Useful for debugging | |
async function installMouseHelper(page) { | |
await page.evaluateOnNewDocument(() => { | |
// Install mouse helper only for top-level frame. | |
if (window !== window.parent) | |
return; | |
window.addEventListener('DOMContentLoaded', () => { | |
const box = document.createElement('puppeteer-mouse-pointer'); | |
const styleElement = document.createElement('style'); |