Private Hackerone Bug bounty에서 +100개 이상의 Reflected Cross Site Scripting & SQL Injection을 발견한 방법…

May 03 2023
.
  • 서브파인더:https://github.com/projectdiscovery/subfinder
  • 자산 찾기:https://github.com/tomnomnom/assetfinder
  • Httpx:https://github.com/projectdiscovery/httpx
  • Paramspider:https://github.com/devanshbatham/ParamSpider
  • Kxss 또는 GF:https://github.com/Emoe/kxss//https://github.com/tomnomnom/gf

for URL in $(</root/recon/target/httpx); do (python3 paramspider.py -d "${URL}");
done;

  1. 범위에 있는 모든 도메인 수집
  2. 다음 명령을 사용하여 Subfinder 실행
  3. subfinder -dL domains.txt -o subfider-subdomains.txt
    

    cat domain_list.txt | assetfinder --subs-only > assetfinder-subdomains.txt
    

    cat subfinder-subdomains.txt assetfinder-subdomains.txt > subdomains.txt
    sort -u subdomains.txt > sort.txt
    

    cat sort.txt | httpx -mc 200 > 200_urls.txt
    

    for URL in $(</root/recon/target/200_urls.txt); do (python3 paramspider.py -d "${URL}");
    done
    

cat filtered_urls.txt | kxss