Share The-Power-Of-Recon
Share The-Power-Of-Recon
Share The-Power-Of-Recon
OF
RECON
OrwaGodfahter
ABOUT ME
• Orwa Atyat (OrwaGodfather) from Jordan
• Full time bug hunter
(Starting bug bounty 2020)
• Bugcrowd P1 Warrior Rank: Top 3
• 500+ critical/high bug submitted
• HOF: Meta / Google / Microsoft / Apple
• Hack Cup Winner 2022/2023 & Team Captain
• 10+ 0Days/CVEs
Microsoft IIS Testing
Response Manipulation
Methods &Tips
IIS
screenshot
screenshot
screenshot
screenshot
screenshot
Discovering
1) Nuclei Template
nuclei-templates/fuzzing/iis-shortname.yaml
https://github.com/projectdiscovery/nucleitemplates/blob/d6636f9169920d3ccefc692bc1a6136e2deb9205/fuzzing/iis-shortname.yaml
2) Wappalyzer extenstion
IIS
screenshot
screenshot
screenshot
screenshot
screenshot
Discovering
3) Shodan http.title:"IIS"
Company dork
Ssl:"Bsides Ahmedabad Inc." http.title:"IIS"
Host dork
Ssl.cert.subject.CN:"bsidesahmedabad.in" http.title:"IIS"
IIS
Tools For Testing
Wordlist
https://github.com/orwagodfather/WordList/blob/main/iis.txt
Its can be used on vulnerable and normal IIS app
Its can be used on other web apps
IIS
Testing
$ shortscan https://bsidesahmedabad.in/admin/
$ shortscan https://bsidesahmedabad.in/test/
FFUF fuzzing
$ ffuf -w iis.txt -u https://bsidesahmedabad.in/FUZZ
Shortname-FUZZ / shortname_FUZZ
IIS
IIS
IIS
IIS
Tips to complete the shortname and get a valid Dir/file
https://IIS/
[+] Identified directories: 1
|_ DS_STO~1
Identified files: 1
|_ DESKTOP~1.ZIP
1) FFUF
$ ffuf -w iis.txt -u https://IIS/ds_stoFUZZ
references
https://learn.microsoft.com/en-us/previous-versions/aspnet/2wawkw1c(v=vs.100)
https://book.hacktricks.xyz/pentesting-web/deserialization/exploiting-__viewstate-knowing-the-secret
https://github.com/bitquark/shortscan
https://twitter.com/ctbbpodcast/status/1688607912434819073
https://www.youtube.com/watch?v=HrJW6Y9kHC4
https://www.youtube.com/watch?v=cqM-MdPkaWo
RESPONSE MANIPULATION
Authentication Bypass
false
Tip:
1 replace [400 bad request] to [200 ok]
2 replace [false] to [true]
its can be done via match and replace
RESPONSE MANIPULATION
Authentication Bypass examples…
Replaced Responses
"code":"USD,","baseAmount":10.99,“
"code":"USD,","baseAmount":0.99,"
"code":"USD,","baseAmount":9.10,"
"code":"INR,","baseAmount":99.10,“
"code":“EUR,","baseAmount":99.10,"
METHODS &TIPS
1) Bypass waf using origin IP via match & replace in burp
2) My method about get more sub domains via amass
3) My method about discovering more domains & 3rd party’s & endpoints
METHODS &TIPS
1) Bypass waf using origin IP via match & replace in burp
• shodan.io Ssl.cert.subject.CN:"domain/subdomain"
• en.fofa.info normal search for domain/subdomain
• search.censys.io normal search for domain/subdomain
• securitytrails.com normal search for domain/subdomain
METHODS &TIPS
any ip can be use as origin IP for this tip as example [400 bad request IP]
Example for Origin IP from shodan Ssl.cert.subject.CN:"godfather.orwa.com"
===>
METHODS &TIPS
Step 2
amass enum -passive -norecursive -noalts -df sudomins.txt -o more-subdomains.txt
testing on Ex appcheck normal 230 sub step 1 259 sub step 2 326 sub
METHODS &TIPS
3) My method about discovering more domains & 3 rd party’s &
endpoints
•Urlscan.io/search
Ex. bsidesahmedabad.in
keywords
bsidesahmedabad.* / bsidesahmedabad-*
Remove duplicate results
Ex. [bsides.* -bsidesahmedabad.in]
Ex. [bsidesahmedabad.* -bsidesahmedabad.in]
Ex. [bsidesahmedabad.in -www.bsidesahmedabad.in -help.bsidesahmedabad.in]
METHODS &TIPS EX:
METHODS &TIPS
• bing & google dorking
keywords
site:domain.com
Remove duplicate results
-site:duplicate.domain.com
Ex.
site:bsidesahmedabad.in -site:supprot.bsidesahmedabad.in
METHODS &TIPS EX:
METHODS &TIPS
• Mixing Fofa & Shodan search engines
Getting Favicon hash from fofa
METHODS &TIPS
METHODS &TIPS
Favicon hash form fofa it can be used on shodan via dork
http.favicon.hash:xxxxxxxxxx
METHODS &TIPS
Favicon hash help customers to locate the spam/fake/phishing hosts….
References for more tips for dorking in sohdan and for finding
more endpoints
The Power Of Shodan
https://www.youtube.com/watch?v=WgMGLlpznao
METHODS &TIPS
• Endpoints Tool (Waymore)
https://github.com/xnl-h4ck3r/waymore
EX:
host.com/xxx/xxxx/xxx.zi [.zip]
host.com/xxx/xxxx/xxx.p [php/pdf]
host.com/xxx/xxxx/xxx.ex [exe]
THANK YOU
https://twitter.com/godfatherorwa
https://bugcrowd.com/orwagodfather
https://hackerone.com/mr-hakhak