Intrusionz3r0
HacktheboxTwitter
  • Welcome
  • Windows Penetration Testing
    • Enumeration
    • Credentials Attacks On Windows
    • Kerberos
    • Abuse ACLS
    • Common Attacks
    • Abuse Tokens
    • Kerberos “Double Hop”
    • Privileged Groups
    • Defense Evasion
    • Active Directory Certificate Services
    • Windows Persistence
    • Privilege Escalation
    • Trust Enumeration and Attacks
    • Windows Lateral Movement
    • Powershell Cheetsheet
    • Microsoft Exchange and Office
  • Linux Penetration Testing
    • Linux Active directory
    • Tools
    • Privilege Groups
    • Post Exploitation
    • Privilege Escalation
      • Sudo Privilege escalation
      • Writable .service files
      • Wildcard on compression binaries
      • Path Abuse
      • Capabilities
      • Exploit Logrotate
      • Weak NFS Privileges
      • Hijacking Tmux Sessions
      • Shared Libraries
      • Shared Object Hijacking
      • Python Library Hijacking
      • Linux Enumeration
    • Stealing Linux Credentials
    • Critical Vulnerabilities
    • Upgrading TTY
    • Process monitoring
    • Miscellaneous
    • Escape Restricted Shell
  • Malware Development
    • Malware Development Essentials
    • Code Snippets
    • Malware Development Intermediate
  • Social Engineering
  • Portforwarding and tunneling
  • File Transfer Techniques
  • Password Attacks
  • Enumeration
    • Network Enumeration
    • (OSINT) Active Enumeration
    • (OSINT) Passive Enumeration
    • [22] SSH
    • [21] FTP
    • [25,465,587] SMTP
    • [53] DNS Enumeration
    • [80 443] HTTP HTTPS
    • [110,143,993,995] IMAP/POP3 Enumeration
    • [111,2049] Network File System
    • [139,445] SMB Enumeration
    • [161] SNMP
    • [512,513,514] R-Services
    • [623] IPMI
    • [873] Rsync
    • [1433] MSSQL
    • [1521] Oracle TNS
    • [3389] Remote Desktop Protocol (RDP)
    • [5985/5986] WinRM
    • [3306] Mysql
    • [513] Rlogin
  • Hacking Web
    • Methodology
    • Vulnerabilities
      • SQL Injection
      • Cross Site Scripting (XSS)
      • File path traversal/Local File Inclusion
      • File Upload Attacks
      • Denial of Service
      • Command Injection
      • Insecure Direct Object Reference (IDOR)
      • XML External Entity (XXE) Injection
      • Web Mass Assignment Vulnerabilities
      • Log4Shell Exploitation Guide
      • Authentication
      • Business Vulnerabilities
      • Access control vulnerabilities
      • Server-Side Request Forgery (SSRF)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • DOM-based vulnerabilities
      • JWT vulnerabilities
      • Password reset poisoning
    • Web Tech Detection viaa Tokens, Headers & Cookies
    • Burpsuite through SOCKS5
    • Bypass 403 - Forbidden
  • OSINT
  • Common Applications
    • Gitlab
    • Splunk
    • Tomcat
    • Joomla
    • Microsoft Internet Information Services (IIS)
    • Nagios XI
    • Wordpress
    • Drupal
    • Tomcat CGI
    • osTicket
    • Attacking Thick Client Applications
    • PRTG Network Monitor
    • Jenkins
    • ColdFusion
    • WebLogic
    • Grafana
    • Umbraco
  • Containers Pentesting
  • C2 Command and Control
    • Sliver
    • Cobalt Strike
    • Mythic
    • Havoc
  • Report Templates
  • Anonymity Guide
  • Labs
    • Vulnlabs
      • Baby
      • Trusted (Chain)
      • Retro
      • Retro2
      • Hybrid (Chain)
      • Baby2
      • Breach
      • Sendai
      • Sweep
      • Delegate
      • Redelegate
      • Media
      • Bruno
      • Cicada
      • Lustrous2
      • Tengu (Chain)
      • Reflection (Chain)
      • Tea (Chain)
      • Heron (Chain)
      • Lustrous (Chain)
      • Kaiju (Chain)
      • Intercept (Chain)
      • Sidecar (Chain)
      • Vigilant (Chain)
      • Job
      • Job2
      • Puppet (Chain)
      • Mythical (Chain)
      • Push (Chain)
Powered by GitBook
On this page
  • Polyglot payload:
  • Identifying Web Technologies by Tokens, Headers, and Cookies

Hacking Web

Burpsuite Tool set

  • Turbo Intruder

  • Collaborator Everywhere

  • Request to pythin

  • Hackvector

It is a good idea to get in the habit of using non-standard file names and parameters for our web shells system($_GET['dcfdd5e021a869fcc6dfaef8bf31377e']);

Polyglot payload:

${{<%[%'"}}%\\.

Identifying Web Technologies by Tokens, Headers, and Cookies

Language/Framework

Common Headers or Cookies

Token Patterns

Additional Indicators

PHP

PHPSESSID, laravel_session, ci_session

- CSRF: csrf_test_name, X-CSRF-TOKEN (Laravel)<br>- JWT: Authorization: Bearer

Cookie length; Base64-encoded tokens

Python (Django)

csrftoken, sessionid

- CSRF: X-CSRFToken<br>- JWT: Authorization: Bearer

Use of headers like X-CSRFToken

Ruby on Rails

_rails_session, _csrf_token

- CSRF: authenticity_token in forms

Clean URLs; RESTful route names

Java (Spring)

JSESSIONID

- CSRF: X-CSRF-TOKEN<br>- JWT: Authorization: Bearer

Common names like JSESSIONID

Node.js (Express)

connect.sid

- JWT: Authorization: Bearer

Routes like /api or /auth; custom headers

.ASPXAUTH, .AspNet.Session

- CSRF: __RequestVerificationToken in forms<br>- JWT: Authorization: Bearer

Cookies with .ASPX

.AspNetCore.Session, .AspNetCore.Identity

- CSRF: RequestVerificationToken

Middleware for JWT and OAuth2

Laravel (PHP)

laravel_session, XSRF-TOKEN

- CSRF: X-CSRF-TOKEN

SHA-256 encoded tokens

CodeIgniter (PHP)

ci_session

- CSRF: csrf_test_name in forms

Lightweight cookies, basic values

Angular (Frontend)

X-XSRF-TOKEN, Authorization: Bearer

- JWT in headers or cookies

Common use of AngularJS in SPAs

React (Frontend)

Authorization: Bearer

- JWT and OAuth2

Tokens managed in local storage or cookies

Vue.js (Frontend)

Authorization: Bearer, X-XSRF-TOKEN

- Similar to Angular

Libraries for handling CSRF and OAuth2

Flask (Python)

session, csrf_token

- JWT: Authorization: Bearer

RESTful APIs with clear routes

FastAPI (Python)

Authorization: Bearer

- JWT: Authorization: Bearer

Similar to Flask, more OpenAPI oriented

Symfony (PHP)

PHPSESSID, symfony

- CSRF: tokens in forms

Custom cookie names

Spring Boot (Java)

JSESSIONID

- JWT: Authorization: Bearer<br>- CSRF: X-CSRF-TOKEN

RESTful routes like /v1/api/

Express.js (Node)

connect.sid

- JWT in headers

Flexible cookie and middleware handling

Django Rest Framework (Python)

Authorization: Bearer

- JWT: Authorization: Bearer

REST prefixes in routes, like /api/v1/

Next.js (React)

Authorization: Bearer, custom cookies

- CSRF or JWT tokens

Combined use of APIs and SSR

External reconnaissance

Understanding where that infrastructure resides is extremely important for our testing. We have to ensure we are not interacting with infrastructure out of our scope.

IP Space

  • Identify the valid ASN for the target.

  • Find netblocks used for the organization’s public-facing infrastructure.

  • Check for cloud presence and hosting providers.

  • Review DNS record entries.

    Tools:

  • Domain Information

    • Based on IP data, DNS, and site registrations.

    • Who administers the domain?

    • Are there any subdomains tied to the target?

    • Publicly accessible domain services (Mail servers, DNS, Websites, VPN portals, etc.).

    • Can we determine what kind of defenses are in place? (SIEM, AV, IPS/IDS in use).

    • Manual DNS record requests against the domain in question or against well known DNS servers, such as 8.8.8.8.

      Tools:

  • Schema Format

    • Can we discover email accounts, AD usernames, and password policies?

    • Use this information to build a valid username list for testing external-facing services (password spraying, credential stuffing, brute force, etc.).

    • Often, the public website for a corporation will have relevant info embedded. News articles, embedded documents, and the "About Us" and "Contact Us" pages can also be gold mines.

    • Searching Linkedin, Twitter, Facebook, your region's major social media sites, news articles, and any relevant info you can find about the organization.

      • Tools:

  • Data Disclosures

    • Look for publicly accessible files (.pdf, .ppt, .docx, .xlsx) that provide insights into the target.

    • Example: files with intranet site listings, user metadata, or critical software/hardware in the environment (e.g., credentials pushed to a public GitHub repo, internal AD username format in PDF metadata).

    • Tools:

  • Breach Data

    • Check for publicly released usernames, passwords, or other critical information.

    • Use this data to help attackers gain a foothold.

      • Tool:

Previous[513] RloginNextMethodology

Last updated 3 months ago

Core**

, ,

https://bgp.he.net/
https://viewdns.info/
https://whois.domaintools.com/
https://github.com/initstring/linkedin2username
GitHub
AWS S3 buckets & Azure Blog storage containers
Google searches using "Dorks"
https://github.com/trufflesecurity/truffleHog
https://buckets.grayhatwarfare.com/
https://haveibeenpwned.com/
https://www.dehashed.com/
ASP.NET
**ASP.NET