Skip to content

Commit

Permalink
Fix uppercase links and anchor
Browse files Browse the repository at this point in the history
  • Loading branch information
swisskyrepo committed Sep 13, 2024
1 parent 541d89b commit c5802aa
Show file tree
Hide file tree
Showing 3 changed files with 34 additions and 20 deletions.
3 changes: 2 additions & 1 deletion API Key Leaks/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
- [Twitter Bearer Token](#twitter-bearer-token)
- [Gitlab Personal Access Token](#gitlab-personal-access-token)
- [HockeyApp API Token](#hockeyapp-api-token)
- [Mapbox API Token](#Mapbox-API-Token)
- [Mapbox API Token](#mapbox-api-token)


## Tools
Expand Down Expand Up @@ -163,6 +163,7 @@ A Mapbox API Token is a JSON Web Token (JWT). If the header of the JWT is `sk`,
curl "https://api.mapbox.com/tokens/v2/MAPBOX_USERNAME_HERE?access_token=YOUR_MAPBOX_ACCESS_TOKEN"
```
## References
* [Finding Hidden API Keys & How to use them - Sumit Jain - August 24, 2019](https://medium.com/@sumitcfe/finding-hidden-api-keys-how-to-use-them-11b1e5d0f01d)
Expand Down
36 changes: 20 additions & 16 deletions Tabnabbing/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,42 +2,46 @@

> Reverse tabnabbing is an attack where a page linked from the target page is able to rewrite that page, for example to replace it with a phishing site. As the user was originally on the correct page they are less likely to notice that it has been changed to a phishing site, especially if the site looks the same as the target. If the user authenticates to this new page then their credentials (or other sensitive data) are sent to the phishing site rather than the legitimate one.

## Summary

* [Tools](#tools)
* [More information about the vulnerability](#More-information-about-the-vulnerability)
* [How to exploit](#How-to-exploit)
* [How to hunt for it](#How-to-hunt-for-it)
* [Description](#description)
* [Exploit](#exploit)
* [Discover](#discover)
* [References](#references)


## Tools

- [Discover Reverse Tabnabbing - Burp Extension](https://portswigger.net/bappstore/80eb8fd46bf847b4b17861482c2f2a30)
- [PortSwigger/discovering-reversetabnabbing](https://portswigger.net/bappstore/80eb8fd46bf847b4b17861482c2f2a30)


## More information about the vulnerability
## Description

When tabnabbing, the attacker searches for links that are inserted into the website and are under his control. Such links may be contained in a forum post, for example. Once he has found this kind of functionality, it checks that the link's `rel` attribute does not contain the value `noopener` and the target attribute contains the value `_blank`. If this is the case, the website is vulnerable to tabnabbing.

## How to exploit
```
1. Attacker posts a link to a website under his control that contains the following JS code: window.opener.location = "http://evil.com"

## Exploit

1. Attacker posts a link to a website under his control that contains the following JS code: `window.opener.location = "http://evil.com"`
2. He tricks the victim into visiting the link, which is opened in the browser in a new tab.
3. At the same time the JS code is executed and the background tab is redirected to the website evil.com, which is most likely a phishing website.
4. If the victim opens the background tab again and doesn't look at the address bar, it may happen that he thinks he is logged out, because a login page appears, for example.
5. The victim tries to log on again and the attacker receives the credentials
```

## How to hunt for it

As already mentioned, you have to search for the following link formats:
## Discover

Search for the following link formats:

```html
<a href="..." target="_blank" rel="" />
or
<a href="..." target="_blank" />
<a href="..." target="_blank" rel="">
<a href="..." target="_blank">
```


## References

- [Reverse Tabnabbing - OWASP, 20.10.20](https://owasp.org/www-community/attacks/Reverse_Tabnabbing)
- [Tabnabbing - Wikipedia, 20.10.20](https://en.wikipedia.org/wiki/Tabnabbing)
* [Reverse Tabnabbing - OWASP, 20.10.20](https://owasp.org/www-community/attacks/Reverse_Tabnabbing)
* [Tabnabbing - Wikipedia, 20.10.20](https://en.wikipedia.org/wiki/Tabnabbing)
15 changes: 12 additions & 3 deletions _template_vuln/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,16 +4,18 @@
## Summary

- [Tools](#tools)
* [Tools](#tools)
* [Something](#something)
* [Subentry 1](#sub1)
* [Subentry 2](#sub2)
* [Subentry 1](#subentry-1)
* [Subentry 2](#subentry-2)


## Tools

- [Tool 1](https://example.com)
- [Tool 2](https://example.com)


## Something

Quick explanation
Expand All @@ -22,6 +24,13 @@ Quick explanation
Exploit
```


### Subentry 1


### Subentry 2


## References

- [Blog title - Author, Date](https://example.com)

0 comments on commit c5802aa

Please sign in to comment.