Notas
  • Introduction
  • Active Directory
    • BloodHound
    • Bypassing
    • Enumeration
    • Groups
    • Methodology
    • Msfvenom
    • Pivoting
    • Privesc
  • CMS
    • Jenkins
    • wordpress
  • CVEs
    • CVE-2017-0199
    • CVE-2019-1414
    • CVE-2021-42287
    • CVE-2021-44228
  • Common Ports
    • DNS - 53
    • LDAP - 389
    • MSSQL - 1433
    • NFS - 2049
    • RPC - 135
    • SMB - 445
    • VNC - 5900
    • ftp-21
    • kerberos-88
    • msrpc-5722
    • mysql-3306
    • rdp-3389
    • redis-6379
    • smtp-25
    • snmp-161
    • squid-3128
    • winrm-5985
  • EXTRA
    • BruteForce
    • Criptography
    • Extra
    • Fuzzing
    • Mounts
    • RevShells
  • Pentesting Android
    • Basic
  • Pentesting Web
    • IIS
    • LFI
    • OWASP TOP 10
    • Padding Oracle Attack
    • SSRF
    • SSTI
    • XSS
  • Pivoting
    • Remote Port Fowarding
    • Remote commands
  • SQLi
    • Conditional-based
    • Enumeration
    • Error-based
    • SQLite
    • Time-based
  • linux
    • Escalada
    • common-vulns
    • docker-breakout
    • ip-tables
    • port-forwarding
    • port-knocking
    • privesc
    • reversing
    • samba
  • scripting
    • Bash
    • PHP
    • Powershell
    • Python
Powered by GitBook
On this page
  • Definir función
  • Variables globales
  • Burp Proxy
  • Ctrl+C
  • Requests
  • Definir sesión
  • Obtener contenido por GET
  • Post Data
  • RE
  • Expresiones regulares
  • Condicionales
  • Texto no en respuesta
  • Archivos
  • Abrir
  • Iterar por cada línea
  1. scripting

Python

Definir función

def def_handler(sig, frame):

Variables globales

Burp Proxy

burp = {'http': 'http://localhost:8080'}

Ctrl+C

signal.signal(signal.SIGINT, def_handler)

Requests

Definir sesión

s = requests.session()

Obtener contenido por GET

r = s.get(main_url)

Post Data

post_data = {
    '__VIEWSTATE': viewstate,
    '__EVENTVALIDATION': eventvalidation,
    'btnUpload': 'Upload'
}

RE

Expresiones regulares

re.findall(r'id="__VIEWSTATE" value="(.*?)"', r.text)[0]

Condicionales

Texto no en respuesta

if "Invalid File. Please try again" not in r.text:
    log.info("Extension %s is valid!!" % extension)

Archivos

Abrir

f = open("/usr/share/wordlists/SecLists/Discovery/Web-Content/raft-large-extensions-lowercase.txt", "rb")

Iterar por cada línea

for extension in f.readlines():
    extension = extension.decode().strip()
    p1.status("Testing with %s" % extension)
    makeRequests(extension)
PreviousPowershell

Last updated 1 year ago