mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
130 lines
6.1 KiB
Markdown
130 lines
6.1 KiB
Markdown
# Web Vulnerabilities Methodology
|
||
|
||
{{#include ../banners/hacktricks-training.md}}
|
||
|
||
在每次 Web Pentest 中,有 **几个隐藏和明显的地方可能存在漏洞**。这篇文章旨在作为一个检查清单,以确认您已在所有可能的地方搜索漏洞。
|
||
|
||
## Proxies
|
||
|
||
> [!NOTE]
|
||
> 现在的 **web** **应用程序** 通常 **使用** 某种 **中介** **代理**,这些代理可能被(滥)用来利用漏洞。这些漏洞需要一个脆弱的代理存在,但通常还需要后端的某些额外漏洞。
|
||
|
||
- [ ] [**Abusing hop-by-hop headers**](abusing-hop-by-hop-headers.md)
|
||
- [ ] [**Cache Poisoning/Cache Deception**](cache-deception/index.html)
|
||
- [ ] [**HTTP Request Smuggling**](http-request-smuggling/)
|
||
- [ ] [**H2C Smuggling**](h2c-smuggling.md)
|
||
- [ ] [**Server Side Inclusion/Edge Side Inclusion**](server-side-inclusion-edge-side-inclusion-injection.md)
|
||
- [ ] [**Uncovering Cloudflare**](../network-services-pentesting/pentesting-web/uncovering-cloudflare.md)
|
||
- [ ] [**XSLT Server Side Injection**](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
|
||
- [ ] [**Proxy / WAF Protections Bypass**](proxy-waf-protections-bypass.md)
|
||
|
||
## **User input**
|
||
|
||
> [!NOTE]
|
||
> 大多数 web 应用程序将 **允许用户输入一些数据以便后续处理。**\
|
||
> 根据服务器期望的数据结构,某些漏洞可能适用或不适用。
|
||
|
||
### **Reflected Values**
|
||
|
||
如果输入的数据可能以某种方式反映在响应中,则页面可能会受到多种问题的影响。
|
||
|
||
- [ ] [**Client Side Template Injection**](client-side-template-injection-csti.md)
|
||
- [ ] [**Command Injection**](command-injection.md)
|
||
- [ ] [**CRLF**](crlf-0d-0a.md)
|
||
- [ ] [**Dangling Markup**](dangling-markup-html-scriptless-injection/index.html)
|
||
- [ ] [**File Inclusion/Path Traversal**](file-inclusion/index.html)
|
||
- [ ] [**Open Redirect**](open-redirect.md)
|
||
- [ ] [**Prototype Pollution to XSS**](deserialization/nodejs-proto-prototype-pollution/index.html#client-side-prototype-pollution-to-xss)
|
||
- [ ] [**Server Side Inclusion/Edge Side Inclusion**](server-side-inclusion-edge-side-inclusion-injection.md)
|
||
- [ ] [**Server Side Request Forgery**](ssrf-server-side-request-forgery/index.html)
|
||
- [ ] [**Server Side Template Injection**](ssti-server-side-template-injection/index.html)
|
||
- [ ] [**Reverse Tab Nabbing**](reverse-tab-nabbing.md)
|
||
- [ ] [**XSLT Server Side Injection**](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
|
||
- [ ] [**XSS**](xss-cross-site-scripting/index.html)
|
||
- [ ] [**XSSI**](xssi-cross-site-script-inclusion.md)
|
||
- [ ] [**XS-Search**](xs-search/index.html)
|
||
|
||
一些提到的漏洞需要特殊条件,其他的只需要内容被反映。您可以在以下位置找到一些有趣的多语言工具,以快速测试漏洞:
|
||
|
||
{{#ref}}
|
||
pocs-and-polygloths-cheatsheet/
|
||
{{#endref}}
|
||
|
||
### **Search functionalities**
|
||
|
||
如果该功能可用于在后端搜索某种数据,您可能可以(滥)用它来搜索任意数据。
|
||
|
||
- [ ] [**File Inclusion/Path Traversal**](file-inclusion/index.html)
|
||
- [ ] [**NoSQL Injection**](nosql-injection.md)
|
||
- [ ] [**LDAP Injection**](ldap-injection.md)
|
||
- [ ] [**ReDoS**](regular-expression-denial-of-service-redos.md)
|
||
- [ ] [**SQL Injection**](sql-injection/index.html)
|
||
- [ ] [**XPATH Injection**](xpath-injection.md)
|
||
|
||
### **Forms, WebSockets and PostMsgs**
|
||
|
||
当 WebSocket 发布消息或表单允许用户执行操作时,可能会出现漏洞。
|
||
|
||
- [ ] [**Cross Site Request Forgery**](csrf-cross-site-request-forgery.md)
|
||
- [ ] [**Cross-site WebSocket hijacking (CSWSH)**](websocket-attacks.md)
|
||
- [ ] [**PostMessage Vulnerabilities**](postmessage-vulnerabilities/index.html)
|
||
|
||
### **HTTP Headers**
|
||
|
||
根据 Web 服务器提供的 HTTP 头,可能存在某些漏洞。
|
||
|
||
- [ ] [**Clickjacking**](clickjacking.md)
|
||
- [ ] [**Content Security Policy bypass**](content-security-policy-csp-bypass/index.html)
|
||
- [ ] [**Cookies Hacking**](hacking-with-cookies/index.html)
|
||
- [ ] [**CORS - Misconfigurations & Bypass**](cors-bypass.md)
|
||
|
||
### **Bypasses**
|
||
|
||
有几个特定功能可能需要一些变通方法来绕过它们。
|
||
|
||
- [ ] [**2FA/OTP Bypass**](2fa-bypass.md)
|
||
- [ ] [**Bypass Payment Process**](bypass-payment-process.md)
|
||
- [ ] [**Captcha Bypass**](captcha-bypass.md)
|
||
- [ ] [**Login Bypass**](login-bypass/index.html)
|
||
- [ ] [**Race Condition**](race-condition.md)
|
||
- [ ] [**Rate Limit Bypass**](rate-limit-bypass.md)
|
||
- [ ] [**Reset Forgotten Password Bypass**](reset-password.md)
|
||
- [ ] [**Registration Vulnerabilities**](registration-vulnerabilities.md)
|
||
|
||
### **Structured objects / Specific functionalities**
|
||
|
||
某些功能将要求 **数据以非常特定的格式进行结构化**(如语言序列化对象或 XML)。因此,更容易识别应用程序是否可能存在漏洞,因为它需要处理这种类型的数据。\
|
||
某些 **特定功能** 也可能存在漏洞,如果使用 **特定格式的输入**(如电子邮件头注入)。
|
||
|
||
- [ ] [**Deserialization**](deserialization/index.html)
|
||
- [ ] [**Email Header Injection**](email-injections.md)
|
||
- [ ] [**JWT Vulnerabilities**](hacking-jwt-json-web-tokens.md)
|
||
- [ ] [**XML External Entity**](xxe-xee-xml-external-entity.md)
|
||
|
||
### Files
|
||
|
||
允许上传文件的功能可能会面临多种问题。\
|
||
生成包含用户输入的文件的功能可能会执行意外代码。\
|
||
打开用户上传的文件或自动生成的包含用户输入的文件的用户可能会受到威胁。
|
||
|
||
- [ ] [**File Upload**](file-upload/index.html)
|
||
- [ ] [**Formula Injection**](formula-csv-doc-latex-ghostscript-injection.md)
|
||
- [ ] [**PDF Injection**](xss-cross-site-scripting/pdf-injection.md)
|
||
- [ ] [**Server Side XSS**](xss-cross-site-scripting/server-side-xss-dynamic-pdf.md)
|
||
|
||
### **External Identity Management**
|
||
|
||
- [ ] [**OAUTH to Account takeover**](oauth-to-account-takeover.md)
|
||
- [ ] [**SAML Attacks**](saml-attacks/index.html)
|
||
|
||
### **Other Helpful Vulnerabilities**
|
||
|
||
这些漏洞可能有助于利用其他漏洞。
|
||
|
||
- [ ] [**Domain/Subdomain takeover**](domain-subdomain-takeover.md)
|
||
- [ ] [**IDOR**](idor.md)
|
||
- [ ] [**Parameter Pollution**](parameter-pollution.md)
|
||
- [ ] [**Unicode Normalization vulnerability**](unicode-injection/index.html)
|
||
|
||
{{#include ../banners/hacktricks-training.md}}
|