Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0%
(1)
0% found this document useful (1 vote)
409 views
4 pages
Advanced Web Attacks and Exploitation
Uploaded by
leary
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF, TXT or read online on Scribd
Download
Save
Save 2 For Later
Share
0%
0% found this document useful, undefined
100%
, undefined
Print
Embed
Report
0%
(1)
0% found this document useful (1 vote)
409 views
4 pages
Advanced Web Attacks and Exploitation
Uploaded by
leary
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF, TXT or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save 2 For Later
Share
0%
0% found this document useful, undefined
100%
, undefined
Print
Embed
Report
Download
Save 2 For Later
You are on page 1
/ 4
Search
Fullscreen
Advanced Web Attacks and Exploitation
5.2.6 Triggering the Vulnerability..............................................................................................142
.3.2 How Houdini Escapes...............................................................................................................5.3
. 145
Using CHR and String Concatenation ........................................................................... 147
5.3.3 It Makes Lexical Sense .....................................................................................................148
5.4 Blind Bats ....................... ......................................................................................................... 148
5.5 Accessing the File System ........................................................................................................ 149
5.5.2 Reverse Shell Via Copy To ............................................................................................... 151
5.6 PostgreSQL Extensions ............................................................................................................. 158
5.6.1 Build Environment ............................................................................................................. 158
5.6.2 Testing the Extension ......................................................................................................161
5.6.3 Loading the Extension from a Remote Location .........................................................162
5.7 UDF Reverse Shell ...................................................................................................................... 162
5.8 More Shells!!! ............................................................................................................................... 165
5.8.1 PostgreSQL Large Objects .............................................................................................. 165
5.8.2 Large Object Reverse Shell ..............................................................................................168
5.9 Summary ...................................................................................................................................... 171
6. Bassmaster NodeJS Arbitrary JavaScript Injection Vulnerability............................................... 172
6.1 Getting Started ............................................................................................................................ 172
6.2 The Bassmaster Plugin ............................................................................................................. 172
6.3 Vulnerability Discovery .............................................................................................................. 173
6.4 Triggering the Vulnerability ....................................................................................................... 181
6.5 Obtaining a Reverse Shell ......................................................................................................... 183
6.6 Wrapping Up ................................................................................................................................ 187
7. DotNetNuke Cookie Deserialization RCE ......................................................................................... 188
7.1 Serialization Basics .................................................................................................................... 188
7.1.1 XmlSerializer Limitations ................................................................................................. 189
7.1.2 Basic XmlSerializer Example...........................................................................................189
7.1.3 Expanded XmlSerializer Example...................................................................................193
7.1.4 Watch your Type, Dude ...................................................................................................197
.2.1 DotNetNuke Vulnerability Analysis.........................................................................................7.2
. 207
0
Vulnerability Overview ...................................................................................................... 200
7.2.2 Manipulation of Assembly Attributes for Debugging ................................................203
7.2.3 Debugging DotNetNuke Using dnSpy ...........................................................................206
7.2.4 How Did We Get Here? ....................................................................................................208
7.3 Payload Options..........................................................................................................................211
WEB-300 Copyright © 2022 Hide01.ir Free Learning. All rights reserved. 5
Advanced Web Attacks and Exploitation
7.3.1 FileSystemUtils PullFile Method .....................................................................................212
7.3.2 ObjectDataProvider Class ................................................................................................212
7.3.3 Example Use of the ObjectDataProvider Instance ......................................................216
7.3.4 Serialization of the ObjectDataProvider .......................................................................220
7.3.5 Enter The Dragon (ExpandedWrapper Class) ..............................................................223
7.4 Putting It All Together ................................................................................................................ 228
7.5 Wrapping Up ................................................................................................................................ 233
8. ERPNext Authentication Bypass and Server Side Template Injection ....................................... 234
8.1 Getting Started ............................................................................................................................ 234
8.1.1 Configuring the SMTP Server.......................................................................................... 234
8.1.2 Configuring Remote Debugging ....................................................................................235
8.1.3 Configuring MariaDB Query Logging .............................................................................244
.2.1 Introduction to MVC, Metadata-Driven Architecture, and HTTP Routing .......................8.2
. 248
5
Model-View-Controller Introduction ............................................................................... 245
8.2.2 Metadata-driven Design Patterns...................................................................................248
8.2.3 HTTP Routing in Frappe...................................................................................................252
.3.1 Authentication Bypass Discovery ...........................................................................................8.3
. 258
7
Discovering the SQL Injection ......................................................................................... 257
8.4 Authentication Bypass Exploitation ........................................................................................ 266
8.4.1 Obtaining Admin User Information ................................................................................ 267
8.4.2 Resetting the Admin Password .....................................................................................268
.5.1 SSTI Vulnerability Discovery ....................................................................................................8.5
. 278
7
Introduction to Templating Engines .............................................................................. 277
8.5.2 Discovering The Rendering Function ............................................................................282
8.5.3 SSTI Vulnerability Filter Evasion ....................................................................................290
.6.1 SSTI Vulnerability Exploitation .............. m..............................................................................8.6
. 293
8
Finding a Method for Remote Com and Execution .................................................. 293
8.6.2 Gaining Remote Command Execution ..........................................................................298
8.7 Wrapping Up ................................................................................................................................ 299
9. openCRX Authentication Bypass and Remote Code Execution.................................................. 300
9.1 Getting Started ............................................................................................................................ 300
9.2 Password Reset Vulnerability Discovery................................................................................ 300
9.2.1 When Random Isn’t ........................................................................................................... 308
9.2.2 Account Determination ...................................................................................................311
9.2.3 Timing the Reset Request ...............................................................................................312
WEB-300 Copyright © 2022 Hide01.ir Free Learning. All rights reserved. 6
Advanced Web Attacks and Exploitation
9.2.4 Generate Token List ..........................................................................................................313
9.2.5 Automating Resets ...........................................................................................................315
.3.2 XML External Entity Vulnerability Discovery .......................................................................... 39.3
19
Introduction to XML .......................................................................................................... 320
9.3.3 XML Parsing ......................................................................................................................320
9.3.4 XML Entities........................................................................................................................321
9.3.5 Understanding XML External Entity Processing Vulnerabilities ..............................322
9.3.6 Finding the Attack Vector ................................................................................................323
9.3.7 CDATA ................................................................................................................................329
9.3.8 Updating the XXE Exploit ................................................................................................330
9.3.9 Gaining Remote Access to HSQLDB .............................................................................331
9.3.10 Java Language Routines .................................................................................................336
.4.2 Remote Code Execution ...........................................................................................................9.4
. 336
9
Finding the Write Location ............................................................................................... 342
9.4.3 Writing Web Shells ...........................................................................................................342
9.5 Wrapping Up ................................................................................................................................ 343
10. openITCOCKPIT XSS and OS Command Injection - Blackbox ............................................... 344
10.1 Getting Started ............................................................................................................................ 344
10.2 Black Box Testing in openITCOCKPIT .................................................................................... 344
10.3 Application Discovery ................................................................................................................ 345
10.3.1 Building a Sitemap ............................................................................................................ 345
10.3.2 Targeted Discovery ..........................................................................................................350
10.4 Intro To DOM-based XSS .......................................................................................................... 355
10.5 XSS Hunting ................................................................................................................................. 357
10.6 Advanced XSS Exploitation ...................................................................................................... 359
10.6.1 What We Can and Can’t Do ............................................................................................. 359
10.6.2 Writing to DOM...................................................................................................................361
10.6.3 Creating the Database ......................................................................................................364
10.6.4 Creating the API .................................................................................................................367
10.6.5 Scraping Content...............................................................................................................369
10.6.6 Dumping the Contents .....................................................................................................372
10.7 RCE Hunting ................................................................................................................................ 373
10.7.1 Discovery ............................................................................................................................. 374
10.7.2 Reading and Understanding the JavaScript.................................................................376
10.7.3 Interacting With the WebSocket Server ........................................................................381
WEB-300 Copyright © 2022 Hide01.ir Free Learning. All rights reserved. 7
Advanced Web Attacks and Exploitation
10.7.4 Building a Client ................................................................................................................381
10.7.5 Attempting to Inject Commands ....................................................................................385
10.7.6 Digging Deeper...................................................................................................................386
10.8 Wrapping Up ................................................................................................................................ 389
11. Concord Authentication Bypass to RCE ..................................................................................... 391
11.1 Getting Started ............................................................................................................................ 391
11.2 Authentication Bypass: Round One - CSRF and CORS ....................................................... 395
11.2.1 Same-Origin Policy (SOP) ................................................................................................ 396
11.2.2 Cross-Origin Resource Sharing (CORS) .......................................................................401
11.2.3 Discovering Unsafe CORS Headers ..............................................................................409
11.2.4 SameSite Attribute ...........................................................................................................411
11.2.5 Exploit Permissive CORS and CSRF .............................................................................414
11.3 Authentication Bypass: Round Two - Insecure Defaults..................................................... 428
11.4 Wrapping Up ................................................................................................................................ 435
12. Server Side Request Forgery......................................................................................................... 437
12.1 Getting Started ............................................................................................................................ 437
12.2 Introduction to Microservices .................................................................................................. 437
12.2.2 Web Service URL Formats ............................................................................................... 438
12.3 API Discovery via Verb Tampering .......................................................................................... 440
12.3.1 Initial Enumeration ... ..................................................................................................... 440
12.3.2 Advanced Enumeration with Verb Tampering .............................................................445
12.4 Introduction to Server-Side Request Forgery ........................................................................ 448
12.4.1 Server-Side Request Forgery Discovery ........................................................................ 448
12.4.2 Source Code Analysis .......................................................................................................450
12.4.3 Exploiting Blind SSRF in Directus ..................................................................................452
12.4.4 Port Scanning via Blind SSRF .........................................................................................454
12.4.5 Subnet Scanning with SSRF ............................................................................................456
12.4.6 Host Enumeration ............................................................................................................459
12.5 Render API Auth Bypass ........................................................................................................... 461
2 .6
1 Exploiting Headless Chrome .................................................................................................... 463
12.6.2 Using JavaScript to Exfiltrate Data ................................................................................ 465
12.6.3 Stealing Credentials from Kong Admin API .................................................................467
12.6.4 URL to PDF Microservice Source Code Analysis ........................................................468
12.7 Remote Code Execution ............................................................................................................ 472
12.7.1 RCE in Kong Admin API .................................................................................................... 473
WEB-300 Copyright © 2022 Hide01.ir Free Learning. All rights reserved. 8
You might also like
Intrusion Detection Honeypots
From Everand
Intrusion Detection Honeypots
Chris Sanders
3/5 (2)
Estmt - 2022 06 10
PDF
No ratings yet
Estmt - 2022 06 10
4 pages
Aquaponic Design Plans Everything You Needs to Know: Everything You Need to Know from Backyard to Profitable Business
From Everand
Aquaponic Design Plans Everything You Needs to Know: Everything You Need to Know from Backyard to Profitable Business
David H Dudley
No ratings yet
Advanced Web Attacks and Exploitation: Offensive Security
PDF
100% (1)
Advanced Web Attacks and Exploitation: Offensive Security
9 pages
Human Resource Planning Term Paper
PDF
No ratings yet
Human Resource Planning Term Paper
21 pages
Gray Hat Hacking the Ethical Hacker's
From Everand
Gray Hat Hacking the Ethical Hacker's
Çağatay Şanlı
5/5 (1)
Securing ChatGPT: Best Practices for Protecting Sensitive Data in AI Language Models
From Everand
Securing ChatGPT: Best Practices for Protecting Sensitive Data in AI Language Models
Matthew C. Smith
No ratings yet
Blog Smarter, Not Harder: SEO, Blogging, and AI Strategies to Skyrocket Your Traffic
From Everand
Blog Smarter, Not Harder: SEO, Blogging, and AI Strategies to Skyrocket Your Traffic
Jay Nans
No ratings yet
ChatGPT for Business: Strategies for Success
From Everand
ChatGPT for Business: Strategies for Success
Matthew C. Smith
1/5 (1)
Software Patterns Made Easy
From Everand
Software Patterns Made Easy
Justice Nanhou
No ratings yet
10K Blueprint
From Everand
10K Blueprint
Cian O Farrell
5/5 (2)
A To Z of Internet: Everything You Wanted to Know
From Everand
A To Z of Internet: Everything You Wanted to Know
Bittu Kumar
No ratings yet
BlockChain for Beginners
From Everand
BlockChain for Beginners
Matthew Smith
No ratings yet
Cybersecurity for Executives: A Guide to Protecting Your Business
From Everand
Cybersecurity for Executives: A Guide to Protecting Your Business
Matthew C. Smith
No ratings yet
Cloud Computing : Beginners And Intermediate User Guide
From Everand
Cloud Computing : Beginners And Intermediate User Guide
David comer
No ratings yet
Content Creation Revolution with chatGPT
From Everand
Content Creation Revolution with chatGPT
Maria Cowen
No ratings yet
Kellory the Warlock
From Everand
Kellory the Warlock
Lin Carter
No ratings yet
Aquaponics Design Plans, Construction, Operation, and Income: Organic Food
From Everand
Aquaponics Design Plans, Construction, Operation, and Income: Organic Food
David H Dudley
No ratings yet
Mastering Python Advanced Concepts and Practical Applications
From Everand
Mastering Python Advanced Concepts and Practical Applications
Aissa Younes
No ratings yet
Aquaponics How to do Everything from Backyard to Profitable Business: from BACKYARD to PROFITABLE BUSINESS
From Everand
Aquaponics How to do Everything from Backyard to Profitable Business: from BACKYARD to PROFITABLE BUSINESS
David H Dudley
No ratings yet
The Linux Terminal for Advanced Users - The Command Line Made Easy: First Edition
From Everand
The Linux Terminal for Advanced Users - The Command Line Made Easy: First Edition
Michael Basler
No ratings yet
Breaking Barriers: S.T.E.M Mentorship in Business
From Everand
Breaking Barriers: S.T.E.M Mentorship in Business
Matthew C. Smith
No ratings yet
Advanced Multiplayer Game Development with Ureal Engine 5: A Comprehensive Guide to C++ Scripting
From Everand
Advanced Multiplayer Game Development with Ureal Engine 5: A Comprehensive Guide to C++ Scripting
Vladimir Kiselev
No ratings yet
Web Video Business
From Everand
Web Video Business
MUHAMMAD NUR WAHID ANUAR
No ratings yet
Aquaponics for Profit
From Everand
Aquaponics for Profit
David H Dudley
No ratings yet
Aquaponics Construct and Operate: Instructions and Everything You Need to Know
From Everand
Aquaponics Construct and Operate: Instructions and Everything You Need to Know
PE David H. Dudley PMP
No ratings yet
Osama the Gun
From Everand
Osama the Gun
Norman Spinrad
5/5 (1)
Plain JavaScript: Learning the Front-End
From Everand
Plain JavaScript: Learning the Front-End
Roger Beans-Rivet
No ratings yet
TINY SHIFTS, BIG RESULTS: How Small Habits Shape Who You Become and Transform Your Life: How Small Habits Shape Who You Become and Transform Your Life: How Small Habits Shape Who You Become and Transform Your Life
From Everand
TINY SHIFTS, BIG RESULTS: How Small Habits Shape Who You Become and Transform Your Life: How Small Habits Shape Who You Become and Transform Your Life: How Small Habits Shape Who You Become and Transform Your Life
J.T. Warren
No ratings yet
Cutting-Edge Desktop UI Development with Python, PySide6, PyQt6
From Everand
Cutting-Edge Desktop UI Development with Python, PySide6, PyQt6
Jay Nans
No ratings yet
Human Nature Potential in Nurture
From Everand
Human Nature Potential in Nurture
David L. Hawk
No ratings yet
Unlocking Statistics for the Social Sciences
From Everand
Unlocking Statistics for the Social Sciences
Norma Sinclair
No ratings yet
Aquaponics Build and Operation Manual: Step-by-Step Instructions, 400+ Pages, 200+Helpful Images
From Everand
Aquaponics Build and Operation Manual: Step-by-Step Instructions, 400+ Pages, 200+Helpful Images
David H Dudley
No ratings yet
The First Science Fiction Novel MEGAPACK®: 6 Great Science Fiction Novels
From Everand
The First Science Fiction Novel MEGAPACK®: 6 Great Science Fiction Novels
John Gregory Betancourt
No ratings yet
TO THINE OWN SELF...: VALUES AND ETHICS IN A COMPLICATED WORLD
From Everand
TO THINE OWN SELF...: VALUES AND ETHICS IN A COMPLICATED WORLD
Ann Noe Dapice
No ratings yet
Web Threats
PDF
No ratings yet
Web Threats
8 pages
HCSCA105 Common Information Security Threats
PDF
No ratings yet
HCSCA105 Common Information Security Threats
31 pages
Lesson 1 ITWS04
PDF
No ratings yet
Lesson 1 ITWS04
33 pages
Web Security: Vulnerability and Threats: Presented by Deepti Patole
PDF
No ratings yet
Web Security: Vulnerability and Threats: Presented by Deepti Patole
21 pages
Chapter 2 - Fundam
PDF
No ratings yet
Chapter 2 - Fundam
36 pages
Tomnomnom PDF
PDF
No ratings yet
Tomnomnom PDF
35 pages
Managing Evolved Threats
PDF
No ratings yet
Managing Evolved Threats
3 pages
7 Week
PDF
No ratings yet
7 Week
30 pages
Threat Actors & Attack Vectors
PDF
No ratings yet
Threat Actors & Attack Vectors
11 pages
Cybersecurity and Risk Management
PDF
No ratings yet
Cybersecurity and Risk Management
46 pages
Norse-WP-How Adv Attacks Get Past
PDF
No ratings yet
Norse-WP-How Adv Attacks Get Past
12 pages
Firewalls and Antivirus Not Enough
PDF
No ratings yet
Firewalls and Antivirus Not Enough
4 pages
Web Application Attack - Eryk Budi Pratama
PDF
No ratings yet
Web Application Attack - Eryk Budi Pratama
24 pages
5G IoT Botnets
PDF
No ratings yet
5G IoT Botnets
9 pages
Threats To Technology
PDF
No ratings yet
Threats To Technology
35 pages
17 - Application Vulnerabilities and Defenses
PDF
No ratings yet
17 - Application Vulnerabilities and Defenses
53 pages
NoteGPT AI PPT 1741495065526
PDF
No ratings yet
NoteGPT AI PPT 1741495065526
22 pages
L2 Rules of Netiquette
PDF
No ratings yet
L2 Rules of Netiquette
54 pages
Cybersecurity Awarnaess PPT Amisha
PDF
No ratings yet
Cybersecurity Awarnaess PPT Amisha
38 pages
"Internet and Network Attacks": Group Reporting
PDF
No ratings yet
"Internet and Network Attacks": Group Reporting
9 pages
CYBER SPHERE AND SECURITY..Assi.
PDF
No ratings yet
CYBER SPHERE AND SECURITY..Assi.
8 pages
Cyber Security in The Use of ICT Cyber and Digital Security
PDF
No ratings yet
Cyber Security in The Use of ICT Cyber and Digital Security
20 pages
Document2 1
PDF
No ratings yet
Document2 1
27 pages
U2-Cyber Offenses
PDF
No ratings yet
U2-Cyber Offenses
29 pages
Preface
PDF
No ratings yet
Preface
6 pages
2
PDF
No ratings yet
2
6 pages
1 Ne
PDF
No ratings yet
1 Ne
7 pages
ISSMP Exam Outline Effective May 2018
PDF
No ratings yet
ISSMP Exam Outline Effective May 2018
11 pages
Module 1 Teaching Prof First Sem 2022-23
PDF
No ratings yet
Module 1 Teaching Prof First Sem 2022-23
29 pages
House of Lords - Farley v. Skinner
PDF
No ratings yet
House of Lords - Farley v. Skinner
5 pages
Judicial Overreach in India
PDF
No ratings yet
Judicial Overreach in India
7 pages
Photo Card: Surname First Name Other Name(s) Regular Intake Application Number 85RRI/ZA/4355677
PDF
No ratings yet
Photo Card: Surname First Name Other Name(s) Regular Intake Application Number 85RRI/ZA/4355677
7 pages
Blanca Nieves en Ingles
PDF
0% (1)
Blanca Nieves en Ingles
9 pages
BM - 2025 Summer TT 01-06-25
PDF
No ratings yet
BM - 2025 Summer TT 01-06-25
9 pages
Module 2 Ver 3.1
PDF
100% (1)
Module 2 Ver 3.1
81 pages
FE Civil Practice Problems
PDF
No ratings yet
FE Civil Practice Problems
12 pages
SHW001 Customer Solution Specification (AutoRecovered)
PDF
No ratings yet
SHW001 Customer Solution Specification (AutoRecovered)
143 pages
IOT Based Electrical Switching Circuit For The Safety of Human and Electrical System
PDF
No ratings yet
IOT Based Electrical Switching Circuit For The Safety of Human and Electrical System
4 pages
Hult Prize 2019
PDF
No ratings yet
Hult Prize 2019
13 pages
2010 Astrotheology Calendar PDF
PDF
100% (2)
2010 Astrotheology Calendar PDF
49 pages
Understanding The New Part L Regs Layout 1
PDF
No ratings yet
Understanding The New Part L Regs Layout 1
3 pages
Peso Guideline
PDF
No ratings yet
Peso Guideline
16 pages
Presentation1 MCA I 2018
PDF
No ratings yet
Presentation1 MCA I 2018
52 pages
GD Combined 2017 12 10 PDF
PDF
No ratings yet
GD Combined 2017 12 10 PDF
1,829 pages
Hurt and Grievous Hurt
PDF
100% (1)
Hurt and Grievous Hurt
31 pages
SIGNED-SIGNED - Cargo Ship Safety Radio Certificate (Harmonized) - 2141709 - 05102311550855
PDF
No ratings yet
SIGNED-SIGNED - Cargo Ship Safety Radio Certificate (Harmonized) - 2141709 - 05102311550855
3 pages
Living Life To The Fullest Essay
PDF
100% (2)
Living Life To The Fullest Essay
3 pages
Jez Final Project PDF
PDF
No ratings yet
Jez Final Project PDF
59 pages
FAR 2 Q2 - Sample Problems With Solutions - FOR EMAIL
PDF
No ratings yet
FAR 2 Q2 - Sample Problems With Solutions - FOR EMAIL
11 pages
Feasibility Analysis Presentation
PDF
No ratings yet
Feasibility Analysis Presentation
12 pages
Chapter 3 - Strategic Planning in Retailing
PDF
No ratings yet
Chapter 3 - Strategic Planning in Retailing
28 pages
Gewud
PDF
No ratings yet
Gewud
3 pages
SAS 202 by Zablon W
PDF
No ratings yet
SAS 202 by Zablon W
55 pages
Five Years in Jail For Spreading Infections UAE's Geocachers Treasure The Thrills
PDF
No ratings yet
Five Years in Jail For Spreading Infections UAE's Geocachers Treasure The Thrills
1 page
Race and The Idea of The Aesthetic
PDF
No ratings yet
Race and The Idea of The Aesthetic
24 pages
Famous Personality
PDF
No ratings yet
Famous Personality
13 pages
Documents
Computers
Internet & Web