Technique, Tool and Lecture #3

Time for another entry of Technique, Tool and Lecture!

Technique:

<!<script>alert(1)</script>

The key point is the <! which one researcher found sometimes allow bypassing AWS WAF.

Yes, that simple…

Source

Tool: 

Spiderfoot, a great tool for both semi-active and passive reconnaissance!

Here are a list of modules that I run when I am at the semi-passive reconnaissance phase of an external pen test:

  • Base64
  • Bing
  • Binary String Extractor
  • Censys
  • Cookies
  • E-Mail
  • Errors
  • File Metadata
  • Google
  • Historic Files
  • Hosting Providers
  • Interesting Files
  • Junk Files
  • Name Extractor
  • Page Info
  • Pastes
  • Phone Numbers
  • S3 Bucket Finder
  • Shodan
  • Spider
  • SSL
  • Strange Headers
  • Web Framework
  • Web Server
  • Yahoo

Download Spiderfoot here

Lecture:

SirenJack: Cracking a ‘Secure’ Emergency Warning Siren System

Source

Check out all the entries of this series!

END TRANSMISSION

Leave a Reply