diff --git a/AWS Amazon Bucket S3/README.md b/AWS Amazon Bucket S3/README.md index 1022175..8b7b51b 100644 --- a/AWS Amazon Bucket S3/README.md +++ b/AWS Amazon Bucket S3/README.md @@ -192,3 +192,5 @@ For example with a proxy : http://4d0cf09b9b2d761a7d87be99d17507bce8b86f3b.flaws * [flaws.cloud Challenge based on AWS vulnerabilities - by Scott Piper of Summit Route](http://flaws.cloud/) * [flaws2.cloud Challenge based on AWS vulnerabilities - by Scott Piper of Summit Route](http://flaws2.cloud) * [Guardzilla video camera hardcoded AWS credential - 0dayallday.org](https://www.0dayallday.org/guardzilla-video-camera-hard-coded-aws-credentials/) +* [AWS PENETRATION TESTING PART 1. S3 BUCKETS - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/) +* [AWS PENETRATION TESTING PART 2. S3, IAM, EC2 - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/) \ No newline at end of file diff --git a/CSRF Injection/README.md b/CSRF Injection/README.md index 7deed48..01a39fe 100644 --- a/CSRF Injection/README.md +++ b/CSRF Injection/README.md @@ -7,6 +7,17 @@ * [Methodology](#methodology) * [Payloads](#payloads) + * [HTML GET - Requiring User Interaction](#) + * [HTML GET - No User Interaction)](#) + * [HTML POST - Requiring User Interaction](#) + * [HTML POST - AutoSubmit - No User Interaction](#) + * [JSON GET - Simple Request](#) + * [JSON POST - Simple Request](#) + * [JSON POST - Complex Request](#) + +## Tools + +* [XSRFProbe - The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.](https://github.com/0xInfection/XSRFProbe) ## Methodology @@ -16,19 +27,19 @@ When you are logged in to a certain site, you typically have a session. The identifier of that session is stored in a cookie in your browser, and is sent with every request to that site. Even if some other site triggers a request, the cookie is sent along with the request and the request is handled as if the logged in user performed it. -### HTML GET – Requiring User Interaction for Proof-of-Concept +### HTML GET - Requiring User Interaction ```html Click Me ``` -### HTML GET (No User Interaction) +### HTML GET - No User Interaction ```html ``` -### HTML POST – Requiring User Interaction for Proof-of-Concept +### HTML POST - Requiring User Interaction ```html
@@ -37,7 +48,7 @@ When you are logged in to a certain site, you typically have a session. The iden
``` -### HTML POST (AutoSubmit – No User Interaction) +### HTML POST - AutoSubmit - No User Interaction ```html
@@ -51,7 +62,7 @@ When you are logged in to a certain site, you typically have a session. The iden ``` -### JSON GET – Simple Request +### JSON GET - Simple Request ```html ``` -### JSON POST – Simple Request +### JSON POST - Simple Request ```html ``` -### JSON POST – Complex Request +### JSON POST - Complex Request ```html