This is a simple guide to perform javascript recon in the bugbounty
- The first step is to collect possibly several javascript files (
more files=more paths,parameters->more vulns)
| // SPDX-License-Identifier: MIT | |
| // OpenZeppelin Contracts v4.3.2 (token/ERC20/ERC20.sol) | |
| pragma solidity ^0.8.0; | |
| import "./IERC20.sol"; | |
| import "./extensions/IERC20Metadata.sol"; | |
| import "../../utils/Context.sol"; | |
| /** |
| 0 | |
| 001 | |
| 002 | |
| 003 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 2 | |
| 2014 |
| #!/bin/bash | |
| # Use this as initial axiom's script on reconftw.cfg file to copy config files to the fleet | |
| axiom-scp ~/Tools/authorized_keys '*':/home/op/.ssh/authorized_keys | |
| axiom-exec 'mkdir -p /home/op/.config/amass/ /home/op/Tools/ /home/op/.config/subfinder/ /home/op/.config/notify/' | |
| axiom-scp ~/.config/amass/config.ini '*':/home/op/.config/amass/config.ini | |
| axiom-scp ~/Tools/h8mail_config.ini '*':/home/op/Tools/h8mail_config.ini | |
| axiom-scp ~/.config/subfinder/config.yaml '*':/home/op/.config/subfinder/config.yaml | |
| axiom-scp ~/Tools/.github_tokens '*':/home/op/Tools/.github_tokens |
| import http.server | |
| import socketserver | |
| from http import HTTPStatus | |
| class Handler(http.server.SimpleHTTPRequestHandler): | |
| def do_GET(self): | |
| self.send_response(HTTPStatus.OK) | |
| self.end_headers() | |
| self.wfile.write(b'Hello world') |
| // This injects a box into the page that moves with the mouse; | |
| // Useful for debugging | |
| async function installMouseHelper(page) { | |
| await page.evaluateOnNewDocument(() => { | |
| // Install mouse helper only for top-level frame. | |
| if (window !== window.parent) | |
| return; | |
| window.addEventListener('DOMContentLoaded', () => { | |
| const box = document.createElement('puppeteer-mouse-pointer'); | |
| const styleElement = document.createElement('style'); |