Jump to content

Recommended Posts

Posted

 

In this thread, I'll include all web hacking techniques and methods. The list is not provided by me. I just found it on my HDD. Credits go to whoever collected this information.

 

Parameter manipulation

 

[*] Arbitary File Deletion

[*] Code Execution

[*] Cookie Manipulation ( meta http-equiv & crlf injection )

[*] CRLF Injection ( HTTP response splitting )

[*] Cross Frame Scripting ( XFS )

[*] Cross-Site Scripting ( XSS )

[*] Directory traversal

[*] Email Injection

[*] File inclusion

[*] Full path disclosure

[*] LDAP Injection

[*] PHP code injection

[*] PHP curl_exec() url is controlled by user

[*] PHP invalid data type error message

[*] PHP preg_replace used on user input

[*] PHP unserialize() used on user input

[*] Remote XSL inclusion

[*] Script source code disclosure

[*] Server-Side Includes (SSI) Injection

[*] SQL injection

[*] URL redirection

[*] XPath Injection vulnerability

[*] EXIF

[*]Buffer Overflows

[*]Clickjacking

[*]Dangling Pointers

[*]Format String Attack

[*]FTP Bounce Attack

[*]Symlinking

 

 

This list below fits in category MultiRequest parameter manipulation

 

[*] Blind SQL injection (timing)

[*] Blind SQL/XPath injection (many types)

 

 

This list below fits in category File checks

 

[*] 8.3 DOS filename source code disclosure

[*] Search for Backup files

[*] Cross Site Scripting in URI

[*] PHP super-globals-overwrite

[*] Script errors ( such as the Microsoft IIS Cookie Variable Information Disclosure )

 

 

This list below fits in category Directory checks

 

[*] Cross Site Scripting in path

[*] Cross Site Scripting in Referer

[*] Directory permissions ( mostly for IIS )

[*] HTTP Verb Tampering ( HTTP Verb POST & HTTP Verb WVS )

[*] Possible sensitive files

[*] Session fixation ( jsessionid & PHPSESSID session fixation )

[*] Vulnerabilities ( e.g. Apache Tomcat Directory Traversal, ASP.NET error message etc )

[*] WebDAV ( very vulnerable component of IIS servers )

 

This list below fits in category Text Search Disclosure

 

[*] Application error message

[*] Check for common files

[*] Directory Listing

[*] Email address found

[*] Local path disclosure

[*] Possible sensitive files

[*] Microsoft Office possible sensitive information

[*] Possible internal IP address disclosure

[*] Possible server path disclosure ( Unix and Windows )

[*] Possible username or password disclosure

[*] Sensitive data not encrypted

[*] Source code disclosure

[*] Trojan shell ( r57,c99,crystal shell etc )

[*] ( IF ANY )Wordpress database credentials disclosure

 

This list below fits in category File Uploads

 

[*] Unrestricted File Upload

 

This list below fits in category Authentication

 

[*] Microsoft IIS WebDAV Authentication Bypass

[*] SQL injection in the authentication header

[*] Weak Password

[*] GHDB - Google hacking database ( using dorks to find what google crawlers have found like passwords etc )

 

This list below fits in category Web Services - Parameter manipulation & with multirequest

 

[*] Application Error Message ( testing with empty, NULL, negative, big hex etc )

[*] Code Execution

[*] SQL Injection

[*] XPath Injection

[*] Blind SQL/XPath injection ( test for numeric,string,number inputs etc )

[*] Stored Cross-Site Scripting ( XSS )

[*] Cross-Site Request Forgery ( CSRF )

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • Inventory restock: Premium business accounts are now available.   ✔ Wallester Business EU 🇪🇺|💳 Unlimited virtual cards, physical cards, 🏦 multi-currency IBAN, ₿ crypto & stablecoin deposits. ✔ Stripe Business UK 🇬🇧|💳 Instant virtual cards (Visa/Mastercard), high-conversion checkout, multi-currency payouts, ₿ crypto payments, no-code payment links. ✔ Mercury Business US 🇺🇸|🏦 US checking & savings, 💳 unlimited virtual cards, domestic & International wires, native stablecoin settlement. ✔ Payset Business EU 🇪🇺|🏦 Multiple IBANs, UK sort code, SEPA Instant, 💳 unlimited virtual cards, multi-currency accounts. ✔ Novo Business US 🇺🇸|🏦 Business checking account, ACH payments & invoicing, 💳 virtual & physical cards, novo boost.
    • Let me see if I understand correctly, older gentlemen, when a newcomer shows up to create modern things with the help of AI, doing what you charge them to do, you point the finger and laugh. I believe that's why everything is stagnant. The product isn't for programming experts, it's for newcomers. Don't buy from you if they can do it themselves using this base. You're going to deliver a similar product, maybe even worse than this one, so why are you complaining? PowerShell, as you well know, started with it, then came new platforms and new apps, new creation models, all with different languages; I chose the simplest one for my taste. This is about being organized and knowing how to choose the right words for each situation. It's not 100%, but it already gives a good impression. Nothing is 100%, so a topic written by AI, and all the code that you charge an absurd amount for to prohibit and sell hacks, could be open source so that everyone can create new practices, new models, new information for passing packets, prohibiting the use of cheats that cause server owners to break so much. Let's remember that the Admin doesn't always shut down the server; it's the players who find problems and take advantage by buying and reselling items, and they say that the GM shuts down the server every week, but that's a lie. What they do is duplicate items with packages and sell them, but perhaps this could give some future developers a starting point to create their own protection following the model in the initial documentation. Because none of you answer a question from a newbie, you think you're superior because you have knowledge, but with AI, people like that can have the same knowledge as you, but with less practice. And if they practice a lot, 10,000 hours, they can be as good as all of you older developers in the L2J field.
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..