commit
e9f81943b6
File diff suppressed because one or more lines are too long
1579
TEMPLATES-STATS.md
1579
TEMPLATES-STATS.md
File diff suppressed because it is too large
Load Diff
20
TOP-10.md
20
TOP-10.md
|
@ -1,12 +1,12 @@
|
|||
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|
||||
|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
|
||||
| cve | 725 | pikpikcu | 273 | cves | 725 | info | 643 | http | 1965 |
|
||||
| lfi | 260 | dhiyaneshdk | 258 | vulnerabilities | 301 | high | 553 | file | 46 |
|
||||
| panel | 248 | daffainfo | 213 | exposed-panels | 247 | medium | 448 | network | 41 |
|
||||
| xss | 244 | pdteam | 195 | technologies | 191 | critical | 273 | dns | 12 |
|
||||
| exposure | 231 | geeknik | 152 | exposures | 188 | low | 152 | | |
|
||||
| wordpress | 223 | dwisiswant0 | 131 | misconfiguration | 136 | | | | |
|
||||
| rce | 198 | gy741 | 72 | takeovers | 64 | | | | |
|
||||
| tech | 181 | pussycat0x | 67 | default-logins | 56 | | | | |
|
||||
| cve2020 | 164 | madrobot | 61 | file | 46 | | | | |
|
||||
| wp-plugin | 149 | princechaddha | 61 | workflows | 36 | | | | |
|
||||
| cve | 731 | pikpikcu | 273 | cves | 731 | info | 650 | http | 1983 |
|
||||
| lfi | 265 | dhiyaneshdk | 263 | vulnerabilities | 307 | high | 558 | file | 46 |
|
||||
| panel | 252 | daffainfo | 216 | exposed-panels | 250 | medium | 451 | network | 42 |
|
||||
| xss | 246 | pdteam | 196 | technologies | 192 | critical | 276 | dns | 12 |
|
||||
| exposure | 233 | geeknik | 153 | exposures | 188 | low | 153 | | |
|
||||
| wordpress | 229 | dwisiswant0 | 131 | misconfiguration | 136 | | | | |
|
||||
| rce | 199 | gy741 | 75 | takeovers | 64 | | | | |
|
||||
| tech | 183 | pussycat0x | 68 | default-logins | 56 | | | | |
|
||||
| cve2020 | 164 | princechaddha | 61 | file | 46 | | | | |
|
||||
| wp-plugin | 155 | madrobot | 61 | workflows | 37 | | | | |
|
||||
|
|
|
@ -0,0 +1,47 @@
|
|||
id: oob-header-based-interaction
|
||||
|
||||
info:
|
||||
name: Header Based Generic OOB Interaction
|
||||
author: pdteam
|
||||
severity: info
|
||||
description: The remote server fetched a spoofed URL from the request headers.
|
||||
reference: https://github.com/PortSwigger/collaborator-everywhere
|
||||
tags: oob,ssrf,generic
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}"
|
||||
headers:
|
||||
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 root@{{interactsh-url}}
|
||||
Referer: http://{{interactsh-url}}/ref
|
||||
Cf-Connecting_ip: spoofed.{{interactsh-url}}
|
||||
X-Real-Ip: spoofed.{{interactsh-url}}
|
||||
From: root@{{interactsh-url}}
|
||||
True-Client-Ip: spoofed.{{interactsh-url}}
|
||||
Client-Ip: spoofed.{{interactsh-url}}
|
||||
Forwarded: for=spoofed.{{interactsh-url}};by=spoofed.{{interactsh-url}};host=spoofed.{{interactsh-url}}
|
||||
X-Client-Ip: spoofed.{{interactsh-url}}
|
||||
X-Originating-Ip: spoofed.{{interactsh-url}}
|
||||
X-Wap-Profile: http://{{interactsh-url}}/wap.xml
|
||||
X-Forwarded-For: spoofed.{{interactsh-url}}
|
||||
Contact: root@{{interactsh-url}}
|
||||
X-Forwarded-Host: spoofed.{{interactsh-url}}
|
||||
X-Host: spoofed.{{interactsh-url}}
|
||||
X-Forwarded-Server: spoofed.{{interactsh-url}}
|
||||
X-HTTP-Host-Override: spoofed.{{interactsh-url}}
|
||||
Cache-Control: no-transform
|
||||
|
||||
matchers-condition: or
|
||||
matchers:
|
||||
- type: word
|
||||
part: interactsh_protocol
|
||||
name: http
|
||||
words:
|
||||
- "http"
|
||||
|
||||
- type: word
|
||||
part: interactsh_protocol
|
||||
name: dns
|
||||
words:
|
||||
- "dns"
|
|
@ -0,0 +1,21 @@
|
|||
id: oob-param-based-interaction
|
||||
|
||||
info:
|
||||
name: Parameter Based Generic OOB Interaction
|
||||
author: pdteam
|
||||
severity: info
|
||||
description: The remote server fetched a spoofed URL from the request parameters.
|
||||
reference: https://github.com/PortSwigger/collaborator-everywhere
|
||||
tags: oob,ssrf,generic
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/?u=http://{{interactsh-url}}/&href=http://{{interactsh-url}}/&action=http://{{interactsh-url}}/&host={{interactsh-url}}&http_host={{interactsh-url}}&email=root@{{interactsh-url}}&url=http://{{interactsh-url}}/&load=http://{{interactsh-url}}/&preview=http://{{interactsh-url}}/&target=http://{{interactsh-url}}/&proxy=http://{{interactsh-url}}/&from=http://{{interactsh-url}}/&src=http://{{interactsh-url}}/&ref=http://{{interactsh-url}}/&referrer=http://{{interactsh-url}}/"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
part: interactsh_protocol
|
||||
name: http
|
||||
words:
|
||||
- "http"
|
|
@ -0,0 +1,56 @@
|
|||
id: request-based-interaction
|
||||
|
||||
info:
|
||||
name: OOB Request Based Interaction
|
||||
author: pdteam
|
||||
severity: info
|
||||
description: The remote server fetched a spoofed DNS Name from the request.
|
||||
reference: https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface
|
||||
tags: oob,ssrf,generic
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |+
|
||||
GET / HTTP/1.1
|
||||
Host: {{interactsh-url}}
|
||||
Cache-Control: no-transform
|
||||
Accept: */*
|
||||
|
||||
- |+
|
||||
GET / HTTP/1.1
|
||||
Host: @{{interactsh-url}}
|
||||
Cache-Control: no-transform
|
||||
Accept: */*
|
||||
|
||||
- |+
|
||||
GET http://{{interactsh-url}}/ HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Cache-Control: no-transform
|
||||
Accept: */*
|
||||
|
||||
- |+
|
||||
GET @{{interactsh-url}}/ HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Cache-Control: no-transform
|
||||
Accept: */*
|
||||
|
||||
- |+
|
||||
GET {{interactsh-url}}:80/ HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Cache-Control: no-transform
|
||||
Accept: */*
|
||||
|
||||
unsafe: true # Use Unsafe HTTP library for malformed HTTP requests.
|
||||
matchers-condition: or
|
||||
matchers:
|
||||
- type: word
|
||||
part: interactsh_protocol
|
||||
name: http
|
||||
words:
|
||||
- "http"
|
||||
|
||||
- type: word
|
||||
part: interactsh_protocol
|
||||
name: dns
|
||||
words:
|
||||
- "dns"
|
Loading…
Reference in New Issue