Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Web Application Hacking - ADCET

Shrimant More
October 03, 2024
10

Web Application Hacking - ADCET

Shrimant More

October 03, 2024
Tweet

Transcript

  1. whoami - Shrimant More - Product Security Analyst @HackerOne -

    HackerOne Brand Ambassador - Pune, India - 4+ years of experience in Security Domain 2
  2. 4 Things you already know Things you will learn in

    today’s workshop Your Brain Just open the lid
  3. What we will learn - Burp Suite Proxy Tool -

    Google dorking - Fuzzing using Intruder and ffuf - Choosing a good program to Hack on - Writing good vulnerability reports - Submitting Vulnerability reports on HackerOne platform 6
  4. - Lot of Jobs Openings - Freelancing - Bug Bounty

    Hunting - Security Research - Security Consultant 9
  5. Intruder - Demo - Visit https://github.com/Pratham0x01/Fuzzing - Open the mentioned

    URL in burp’s browser - Open the two wordlists in different tabs - Use wordlist1.txt - Use wordlist2.txt - Use wordlist3.txt
  6. Ffuf - Demo - Visit https://github.com/Pratham0x01/Fuzzing - Open the mentioned

    URL in burp’s browser - Open the two wordlists in different tabs - Use wordlist1.txt - Use wordlist2.txt - Use wordlist3.txt
  7. - What is Google Dorks? - How it Works? -

    Why to use Google Dorks? - Q&A
  8. What is Google Dorks - It is NOT Google hacking.

    - Collection of operators. - Gives results based on queries. It is a special search term in which a user provides specific queries as a search to access specific information which is not available using normal search. Result obtained is based on type of operators used to make the search.
  9. Why to Use Google Dorks? - To find login panels.

    - To explore hidden files. - To explore hidden sensitive endpoints. - To explore open/vulnerable web servers. - To find cached version of website.
  10. Before getting into the details there are some terms we

    need to know - Operators. - Special Characters(+, -, ~).
  11. Common Operators - Site: name of the website - inurl:

    specified keyword - intitle: required keyword - intext: required keyword - filetype: pdf,doc, log, etc. - cache:website address
  12. Common Examples - Site: example.com inurl: "/admin" intitle:"Admin Login“ -

    Site: example.com intitle:"index of" "config.php“ - intitle:”index of” inurl:ftp - Site: example.com filetype:log - filetype:log username putty - intitle:"Index of" wp-admin - "index of" "database.sql.zip" - intext:company_keyword & ext:txt | ext:sql | ext:cnf | ext:config | ext:log & intext:"admin" | intext:"root" | intext:"administrator" & intext:"password" | intext:"root" | intext:"admin" | intext:"administrator“
  13. What to look for - Reputation: Good reviews and ratings

    - Scope: Clearly defined and relevant to skill set. - Rewards: Check the rewards offered by the program. - Response Efficiency: Check if the company has a good history of responding to vulnerabilities reported through the program. - Communication: Look for programs that have clear communication channels and respond promptly to bug reports.
  14. Why it is important - It makes easier to understand

    the cause of vulnerability. - It makes easier to distinguish the severity. - It is easier to reproduce the reported issue. - It makes easier to fix the vulnerability.
  15. What’s there in a good report? - Summary: Brief summary

    introducing the reader to your finding. - Steps to Reproduce: Step performed in order to regenerate the vulnerability - Proof of Concept: Screenshots or Video of performed attack. - Impact: if this bug were exploited, what could happen? - Supporting Material: Any logs, reference links etc. - Severity: To show how severe the vulnerability is.