How to get Entry Level Job in Cyber Security
April 14, 2022 Davinder
August 28, 2020 Davinder
Portswigger.net will give you detailed video for burp setup , But to hunt bugs on Android , Below are some important steps in order to unpin Apps for testing . To do so you need to install below apps
1. Dowload genymotion - This is Your Andoid Emulater
2. Download super su v2.46 or latest
3. Download xposed installer apk
4. download xposed sdk
5. Download ssl unpinning
first root your android fone
than download xposed apk in that fone
than install xposed sdk (Note sdk version must be same as your fone apk version)
than ssl unpinning
After all steps , Restart android phone.
After Restarting the phone , Open SSL pinning App, Select the app you want to test and click on upin.
After that capture the requests on the Burp and have fun.
April 28, 2020 Davinder
davindertutorials.com, a TRUSTED website allows you to redirect to any other website. Then a malicious user can simply redirect davindertutorials.com to attacker.com, and people fall for it all the time believing that it’s trusted, but infact, it’s not. So allowing redirects to any website without a stop in the middle or without a proper notification for the user is Bad.https://example.com/. And let’s assume that there’s a link likehttps://example.com/signup?redirectUrl=https://example.com/login
https://example.com/login which is specified in the HTTP GET Parameter redirectUrl.example.com/login to attacker.com?https://example.com/signup?redirectUrl=https://attacker.com/
attacker.com after the signup, this means we have an open redirect vulnerablility. This is a classic open redirect vulnerability.<?php
$url_to_redirect = $_GET['redirect_url'];
header('Location: ' . $url_to_redirect);
die();
redirect_url parameter and redirects to that url using the Location HTTP header. response.sendRedirect(request.getParameter("u"));
u and blindly redirects it to the specified url.window.location.href = "https://attacker.com";
location.href of window’s object. This will cause a redirect. If there are no checks inplace, then it’s a bug.<meta http-equiv="refresh" content="0;URL='http://attacker.com/'" />
content and also you can specify the refresh delay time.inurl:redirectUrl=http site:target.comtarget.com/?redirect_url=https://attacker.com.target.com//attacker.com.target.com/@attacker.com. In this case the interpretation will be like, the target.com is the username and attacker.com will be the domain.javascript:confirm(1).target.com/?image_url=attacker.com/.jpg if there’s an image resource being loaded.target.com/?redirect_url=target.com.attacker.com to bypass weak regex implementations.https://attacker%E3%80%82com.target.com@%E2%80%AE@attacker.com.https:attacker.com.http:/\/\attacker.com or https:/\attacker.com.redirect_url=.jp resulting in redirection of target.com.jp which is not the same as target.com.t𝐀rget.com or 𝐀ttacker.com(‘𝐀’ is “\uD835\uDC00”).example.com. It has a password recovery page at example.com/forgot-password. You enter the email and you click on Forgot Password button, and it’ll send you an email with a password reset link, and this link might look likehttps://example.com/reset-password/some-random-token?redirect=https://example.com/login
redirect parameter and change it tohttps://example.com/reset-password/some-random-token?redirect=https://attacker.com/login