How to get Entry Level Job in Cyber Security
April 14, 2022 Davinder
August 28, 2020 Davinder
Portswigger.net will give you detailed video for burp setup , But to hunt bugs on Android , Below are some important steps in order to unpin Apps for testing . To do so you need to install below apps
1. Dowload genymotion - This is Your Andoid Emulater
2. Download super su v2.46 or latest
3. Download xposed installer apk
4. download xposed sdk
5. Download ssl unpinning
first root your android fone
than download xposed apk in that fone
than install xposed sdk (Note sdk version must be same as your fone apk version)
than ssl unpinning
After all steps , Restart android phone.
After Restarting the phone , Open SSL pinning App, Select the app you want to test and click on upin.
After that capture the requests on the Burp and have fun.
April 28, 2020 Davinder
davindertutorials
.com
, a TRUSTED website allows you to redirect to any other website. Then a malicious user can simply redirect davindertutorials
.com
to attacker.com
, and people fall for it all the time believing that it’s trusted, but infact, it’s not. So allowing redirects to any website without a stop in the middle or without a proper notification for the user is Bad.https://example.com/
. And let’s assume that there’s a link likehttps://example.com/signup?redirectUrl=https://example.com/login
https://example.com/login
which is specified in the HTTP GET Parameter redirectUrl
.example.com/login
to attacker.com
?https://example.com/signup?redirectUrl=https://attacker.com/
attacker.com
after the signup, this means we have an open redirect vulnerablility. This is a classic open redirect vulnerability.<?php
$url_to_redirect = $_GET['redirect_url'];
header('Location: ' . $url_to_redirect);
die();
redirect_url
parameter and redirects to that url using the Location
HTTP header. response.sendRedirect(request.getParameter("u"));
u
and blindly redirects it to the specified url.window.location.href = "https://attacker.com";
location.href
of window
’s object. This will cause a redirect. If there are no checks inplace, then it’s a bug.<meta http-equiv="refresh" content="0;URL='http://attacker.com/'" />
content
and also you can specify the refresh delay time.inurl:redirectUrl=http site:target.com
target.com/?redirect_url=https://attacker.com
.target.com//attacker.com
.target.com/@attacker.com
. In this case the interpretation will be like, the target.com
is the username and attacker.com
will be the domain.javascript:confirm(1)
.target.com/?image_url=attacker.com/.jpg
if there’s an image resource being loaded.target.com/?redirect_url=target.com.attacker.com
to bypass weak regex implementations.https://attacker%E3%80%82com
.target.com@%E2%80%AE@attacker.com
.https:attacker.com
.http:/\/\attacker.com
or https:/\attacker.com
.redirect_url=.jp
resulting in redirection of target.com.jp
which is not the same as target.com
.t𝐀rget.com
or 𝐀ttacker.com
(‘𝐀’ is “\uD835\uDC00”).example.com
. It has a password recovery page at example.com/forgot-password
. You enter the email and you click on Forgot Password button, and it’ll send you an email with a password reset link, and this link might look likehttps://example.com/reset-password/some-random-token?redirect=https://example.com/login
redirect
parameter and change it tohttps://example.com/reset-password/some-random-token?redirect=https://attacker.com/login