LuciferAviSonicX

Sunday 5

Sep 17th, 2017
180
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.71 KB | None | 0 0
  1. Burp Suite
  2. ----------
  3. Tucha sa.... sasta sa.... tikau sa... tool
  4.  
  5.  
  6. "Hacked By Indian Hacker"
  7.  
  8.  
  9.  
  10. 2.2 crores....
  11.  
  12. 1000 Million Dollars
  13.  
  14.  
  15. OTP --> 4 digits..... beta version.....
  16. forget password..... OTP.....
  17. OTP Brute Forcing....
  18. 0000-9999
  19.  
  20. www.facebook.com..... 4-5 baar
  21. m.facebook.com..... unlimited try
  22.  
  23. Brute Forcing
  24. -------------
  25. Lock ----> Key..... key is not working..... tod fod...
  26. Sare password... all possible combination of the password... try.... if right then i will get access of the thing.... if not.... agla word try kro....
  27.  
  28. 000000-999999
  29.  
  30. Open Burp Suite
  31. goto Proxy--> Options--> 127.0.0.1:8080
  32.  
  33. Goto Browser
  34. open Menu---> Options ---> Advanced ---> Network ---> Settings
  35. Manual Proxy ----> 127.0.0.1-->8080
  36.  
  37.  
  38.  
  39. Welcome to the password protected area admin
  40.  
  41.  
  42. GET /dv18/vulnerabilities/brute/?username=Abhijeet&password=username&Login=Login HTTP/1.1
  43. Host: 127.0.0.1
  44. User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0
  45. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  46. Accept-Language: en-US,en;q=0.5
  47. Referer: http://127.0.0.1/dv18/vulnerabilities/brute/?username=abhijeet&password=lucideus&Login=Login
  48. Cookie: security=low; PHPSESSID=sq92gtpla0v78ch9mt9qot4sh0
  49. Connection: close
  50. Upgrade-Insecure-Requests: 1
  51.  
  52.  
  53.  
  54.  
  55.  
  56.  
  57. POST /bank/login.aspx HTTP/1.1
  58. Host: demo.testfire.net
  59. User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0
  60. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  61. Accept-Language: en-US,en;q=0.5
  62. Referer: http://demo.testfire.net/bank/login.aspx
  63. Content-Type: application/x-www-form-urlencoded
  64. Content-Length: 40
  65. Cookie: ASP.NET_SessionId=lbidtv554elc0gfr1netynjj; amSessionId=02314248311
  66. Connection: close
  67. Upgrade-Insecure-Requests: 1
  68.  
  69. uid=admin&passw=password&btnSubmit=Login
  70.  
  71.  
  72.  
  73.  
  74. POST /bank/ws.asmx HTTP/1.1
  75. Host: demo.testfire.net
  76. User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0
  77. Accept: */*
  78. Accept-Language: en-US,en;q=0.5
  79. Referer: http://demo.testfire.net/bank/transfer.aspx
  80. SOAPAction: http://www.altoromutual.com/bank/ws/TransferBalance
  81. Content-Type: text/xml
  82. Content-Length: 555
  83. Cookie: ASP.NET_SessionId=lbidtv554elc0gfr1netynjj; amSessionId=02314248311; amUserInfo=UserName=anNtaXRo&Password=RGVtbzEyMzQ=; amUserId=100116014; amCreditOffer=CardType=Gold&Limit=10000&Interest=7.9
  84. Connection: close
  85.  
  86. <?xml version="1.0" encoding="UTF-8"?>
  87. <soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"
  88. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  89. xmlns:xsd="http://www.w3.org/2001/XMLSchema">
  90. <soap:Body>
  91. <TransferBalance xmlns="http://www.altoromutual.com/bank/ws/">
  92. <transDetails>
  93. <transferDate>2000-01-01</transferDate>
  94. <debitAccount>1001160141</debitAccount>
  95. <creditAccount>1001160140</creditAccount>
  96. <transferAmount>10000</transferAmount>
  97. </transDetails>
  98. </TransferBalance>
  99. </soap:Body>
  100. </soap:Envelope>
  101.  
  102.  
  103.  
  104. 1. User good encryption certificate
  105. 2. Always use HTTPS instead of HTTP
  106. 3. Always use and redirect using POST method instead of GET method
  107.  
  108.  
  109.  
  110.  
  111. Tool --> Netsparker
  112. --------------------
  113. Vulnerability Scanning Tool
  114. Chota sa.... sasta sa.... tikau sa pyara sa tool
  115.  
  116.  
  117. Javascript
  118. ----------
  119. java --> Its a programming language... it is used for creating software
  120.  
  121. javascript --> It is also a programming language.... but used only for website and customisation
  122.  
  123. alerts
  124. popups
  125. etc etc
  126.  
  127.  
  128. <html>
  129. <head>
  130. <title>FirstScript</title>
  131. </head>
  132. <body>
  133.  
  134. <form>
  135. first number : <input type="text" id="one"><br>
  136. second number : <input type="text" id="two"><br>
  137. <input type="submit" onClick="sum()">
  138. </form>
  139. <script>
  140. function sum()
  141. {
  142. var a = document.getElementById("one").value;
  143. var b = document.getElementById("two").value;
  144. var s = a + b;
  145. document.write(s);
  146. alert(s);
  147. }
  148. </script>
  149. </body>
  150. </html>
  151.  
  152. Cross Site Scripting
  153. --------------------
  154. It is a javascript based vulnerability... which runs when your browser's javascript is enabled...
  155.  
  156. Where I can find a XSS BUG
  157. ==========================
  158. comment box, message box, feedback box, post your status
  159.  
  160. E-commerce site
  161. social networking
  162. news site
  163. Survey site
  164.  
  165.  
  166. There are two types of XSS
  167. ---------------------------
  168. 1. Reflected XSS --> It is just one time use only.... ek baar dalo... refresh kro.... fir se gayab
  169. 2. Stored XSS --> Ek baar dalo and jb tk database reset nahi hota.... tb tk me attack kr sakta hu..
  170.  
  171.  
  172.  
  173.  
  174. cookie ---> username&password&timestemp&sessionID
  175.  
  176. Security = Low
  177. <script>alert("XSS Mill Gya")</script>
  178.  
  179. <script> --> ""
  180.  
  181. 1. <ScRiPt>alert("XSS mil gya")</ScRiPt>
  182. 2. <scr<script>ipt> <script>
  183.  
  184.  
  185. <script>alert("XSS Mill Gya")</script>
  186. </>()
Add Comment
Please, Sign In to add comment