Skip to content

This repository contains references to all the relevant reports w.r.t Owasp Top 10 vulnerabilities and many more.

Notifications You must be signed in to change notification settings

najam1997/PenetrationTestingWriteups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 

Repository files navigation

Penetration Testing Writeups

This repository contains references to all the relevant reports w.r.t Owasp Top 10 vulnerabilities and many more.
Each attack and report will be provided a use case against which it'll be applicable to save time for viewers.

Key:
πŸ“: Description

Attack 1: Broken Access Control

Reports:

πŸ“: A basic IDOR in zomato application which the attacker could use to view saved paymed info of other users through id manipulation.

πŸ“: A basic IDOR on an API endpoint which the attacker can use to extract PII through id manipulation and the author used automation script to develop an interesting POC.

πŸ“: An interesting case of IDOR, that used timestamp (which can be manipulated) as the second source of validation but failed to validate authorization token, thus, leading to account takeover.

πŸ“: A basic IDOR on an API endpoint through method manipulation.

πŸ“: A simple case of IDOR throuh UUID manipulation. The API endpoint was retrieved through a hidden JS file using an interesting recon methodology.

πŸ“: A simple case, where a user who is admin is downgraded from the role but still has the rights to perform user deletion.

πŸ“: A couple of simple BAC vulnerabilities on API endpoints, one was the token still being active even after the user's removal. Second was request parameter manipulation when generating the token for additional rights.

πŸ“: A basic case of IDOR where when the JWT token was removed, the API was giving all the user's data.

πŸ“:

πŸ“: A simple case of IDOR to retrieve background ID and then exploit broken access control to view reports. The enumeration in this report is good.

πŸ“: Interesting case of extracting sensitive info through GraphQL for IDOR.

πŸ“:

Attack 2: Broken Authentication

Reports:

πŸ“: A basic case of bruteforcing credentials. Tedious (because of recon and then individually attacking each subdomain) but rewarding task.

πŸ“: OTP bypass via response manipulation.

πŸ“: A simple case of broken JWT mechanism where using the JSON Web Tokens extension in Burp, the attacker could change the uid of the user to bump their role to admin.

πŸ“: A simple case of parameter manipulation in response to bump the user's role to admin.

πŸ“: A case of improperly implemented Google Oauth in an app, that could be leveraged to generate login link for any email id.

πŸ“: A simple case of password reset token working in the case of other emails as well due to which attacker is successfully able to change the password of the victim.

πŸ“: A very interesting case of emailing the victim through automated email in Figma and signing them up.

πŸ“: A simple case of change victim's password through forgot password link where the token wasn't verifying.

πŸ“: A simple case of oauth bypass where if the email is signed up manually, it'll log you in through Oauth as well.

πŸ“: A simple yet interesting case of Email Verification bypass where CSRF token and Session ID were used.

Attack 3: Cross-site Scripting

Reports:

πŸ“: An interesting XSS case where payload is injected through declaration of a variable.

πŸ“: A stored XSS was found of bing when uploading a video on it. The most interesting part was, a simple <script> tag was used to trigger the payload.

πŸ“: An interesting case of character whitelist bypass to achieve RXSS.

πŸ“:

πŸ“:

πŸ“:

Attack 4: Cross-site Request Forgery

Reports:

πŸ“: An

πŸ“: An

πŸ“: An

Attack 5: Information Disclosure and Automation

Reports:

πŸ“: An

πŸ“: A simple case of Information Disclosure through google dorks.

πŸ“: A simple case of API Key disclosure but interesting case of privelege escalation through recon.

Attack 6: Denial of Service

Reports:

πŸ“: In this Defcon talk by Lupin, he discusses multiple types of DOS from easy to complex exploits.

Attack 7: Dependency Confusion

Reports:

πŸ“: A simple case of D.C where an npm package was found in recon that was claimable. The POC is easy to understand.

Reports:

πŸ“:

Attack 8: Injection

Reports:

πŸ“: An interesting case of Template injection in zendesk in the subject body of the form.

https://medium.com/@MianHammadx0root/exploiting-ssti-vulnerability-on-an-e-commerce-website-a-professional-walkthrough-6cc95afb2b38

πŸ“: A simple case of Command Injection via File Upload.

πŸ“:

Attack 9: Subdomain Takeover

Reports:

πŸ“: A simple case of subdomain takeover of the domain discovered through recon.

πŸ“: A simple case of subdomain takeover with interesting recon.

Attack 10: Open-Redirect

Reports:

πŸ“: ATO via open redirect. The recon is simple and effective.

Attack 11: Race-Condition

Reports:

πŸ“: A simple case of Race Condition through executing multiple requests at the same time.

Attack 11: SSRF

Reports:

πŸ“:

Attack 12: HTTP Request Smuggling

Reports:

Android

About

This repository contains references to all the relevant reports w.r.t Owasp Top 10 vulnerabilities and many more.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published