-
Enumeration
-
Authentication Bypass
- Find All pages and parameters and map in any mindmap software (xmind proffered)
- create 2 nodes Pre-Auth and Post-Auth and divide pages accordingly
- Focus on preauth pages to find vulnerabilities
- Find the suspicious pages and parameters from preauth and target that first.
- Vulnerabilities to identify which can help to bypass authentication
-
RCE
- Divide PostAuthenticated pages into 2 section Admin and non-admin.
- Focus on AdminOnly Pages to find vulnerabilities.
-
Exploitation
- Find vulnerabilities and try exploiting it without scripting.
- Created notes as TODO so it will be easier to write exploit.
-
Automation
- Make sure you have todo list
- According to TODO list start writing functions.
- Always create modularized exploit
- Test each functions before moving to the next
- chain functions with conditional statements
- ex. #login
def login(target,username,password):
s = session.session()
s.post(url,data)
return session
- Exploits that has functions that take user input and return valuable data
- Rikunj Sindhwad