Skip to content

Commit 62cd896

Browse files
committed
feat: new web app notes
1 parent 402bea5 commit 62cd896

16 files changed

+94
-2
lines changed

peh/1-intro/README.md

+2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# 1. Introduction & Networking
22

3+
---
4+
35
## Intro
46

57
**Ethical hackers** are *allowed and hired* to try to hack into an organization by assessing its security posture.

peh/2-lab/README.md

+2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# 2. Lab Set Up, Linux & Python
22

3+
---
4+
35
## Lab Set Up
46

57
> **Virtualizers**

peh/3-eth-hack/capstone.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Capstone Labs
1+
# Capstone Practical Labs
22

33
Import all the [VMs](https://drive.google.com/drive/folders/1xJy4ozXaahXvjbgTeJVWyY-eUGIKgCj1) into [VMWare Workstation Pro (free)](https://support.broadcom.com/group/ecx/productdownloads?subfamily=VMware%20Workstation%20Pro) or Virtualbox and change Network adapter to `NAT`.
44

peh/3-eth-hack/recon.md

+51
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,57 @@ amass enum -d syselement.com
127127

128128
➡️ [httprobe](https://github.com/tomnomnom/httprobe) - take a list of domains and probe for working (alive) http and https servers
129129

130+
➡️ [assetfinder](https://github.com/tomnomnom/assetfinder) - find domains and subdomains related to a given domain
131+
132+
```bash
133+
# Go is necessary (installed via pimpmykali.sh)
134+
go get -u github.com/tomnomnom/assetfinder
135+
136+
# or in Kali
137+
sudo apt install assetfinder
138+
```
139+
140+
```bash
141+
assetfinder syselement.com
142+
143+
assetfinder --subs-only tesla.com
144+
```
145+
146+
### Automated domain recon script
147+
148+
- Little `bash` script for sub-domains hunting
149+
150+
```bash
151+
#!/bin/bash
152+
153+
url=$1
154+
155+
if [ ! -d "$url" ]; then
156+
mkdir $url
157+
fi
158+
159+
if [ ! -d "$url/recon" ]; then
160+
mkdir $url/recon
161+
fi
162+
163+
# Assetfinder
164+
echo "[+] Harvesting subdomains with assetfinder..."
165+
assetfinder $url >> $url/recon/assets.txt
166+
# get only subdomains containing $url
167+
cat $url/recon/assets.txt | grep $1 >> $url/recon/final.txt
168+
rm $url/recon/assets.txt
169+
170+
# Amass
171+
# echo "[+] Harvesting subdomains with amass..."
172+
# amass enum -d $url >> $url/recon/f.txt
173+
# sort -u $url/recon/f.txt >> $url/recon/final.txt
174+
# rm $url/recon/f.txt
175+
176+
177+
```
178+
179+
180+
130181
---
131182

132183
## Website technologies

peh/6-webapp/1-web-lab.md

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Web App Lab Setup

peh/6-webapp/2-web-sqli.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - SQL Injection
2+

peh/6-webapp/3-web-xss.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - XSS
2+

peh/6-webapp/4-web-cmd-injection.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - Command Injection
2+

peh/6-webapp/5-web-file-upload.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - Insecure File Upload
2+

peh/6-webapp/6-web-auth-attacks.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - Authentication Attacks
2+

peh/6-webapp/7-web-xxe.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - XXE
2+

peh/6-webapp/8-web-idor.md

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
# Web App - IDOR
2+

peh/6-webapp/9-web-capstone-lab.md

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Web App - Capstone Practical Lab

peh/6-webapp/README.md

+18-1
Original file line numberDiff line numberDiff line change
@@ -1 +1,18 @@
1-
# 6. Web Application
1+
# 6. Web Application
2+
3+
---
4+
5+
## Sections
6+
7+
1. [Web App Lab Setup](2-web-lab.md)
8+
2. [Web App - SQL Injection](3-web-sqli.md)
9+
3. [Web App - XSS](4-web-xss.md)
10+
4. [Web App - Command Injection](5-web-cmd-injection.md)
11+
5. [Web App - Insecure File Upload](6-web-file-upload.md)
12+
6. [Web App - Authentication Attacks](7-web-auth-attacks.md)
13+
7. [Web App - XXE](8-web-xxe.md)
14+
8. [Web App - IDOR](9-web-idor.md)
15+
9. [Web App - Capstone Practical Lab](10-web-capstone-lab.md)
16+
17+
---
18+

peh/README.md

+3
Original file line numberDiff line numberDiff line change
@@ -40,3 +40,6 @@ Instructor: [Heath Adams - The Cyber Mentor](https://www.thecybermentor.com/)
4040
> ### ❗ Disclaimer
4141
>
4242
> * **Do not use the covered attacks and techniques on real IP addresses, hosts or networks without proper authorization!**
43+
44+
---
45+

peh/peh-references.md

+1
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,7 @@
8080
- [crt.sh](https://crt.sh/)
8181
- [amass](https://github.com/owasp-amass/amass)
8282
- [httprobe](https://github.com/tomnomnom/httprobe)
83+
- [assetfinder](https://github.com/tomnomnom/assetfinder)
8384
- [BuiltWith.com](https://builtwith.com/)
8485
- [Wappalyzer.com](https://www.wappalyzer.com/)
8586
- [WhatWeb](https://github.com/urbanadventurer/WhatWeb/)

0 commit comments

Comments
 (0)