text
stringlengths 0
174
|
---|
This is the easiest bug you can find right now i.e |
Finding misconfigured JS files information: |
Ok so, Finding this vulnerability consist of 2 parts, first is finding all JS files of that website, second is finding misconfigured information from that extracted JS files. |
Finding JS files: |
For finding all JS files there are two most popular tools for this i.e. SubJS and Katana. |
First Step: Install Katana |
Second Step: Run Command |
katana -list {domains.txt} -d 5 -jc | grep ".js$" | uniq | sort |
Run this command to run katana for finding all JS files of provided list of domains. |
Remember to add your list of subdomains of a particular website in place of {domains.txt} & configure it for your own ease. |
And after some crawling it will show JS files. Remember to save them. |
Third Step: Extracting sensitive information from JS files |
For extracting all sensitive information we will be using a tool called SecretFinder. |
Download SecretFinder (GitHub) |
Now after installing SecretFinder then run the following command |
cat {jsfilesgottenfromkatana.txt} | while read url; do python3 |
SecretFinder/SecretFinder.py -i $url -o cli; done |
And it will display all possible credentials of all provided JS files fetched from katana |
Now do whatever you want with it who cares . Hack the planet |
gaga |
awfaffa |
No dataset card yet
New: Create and edit this dataset card directly on the website!
Contribute a Dataset Card- Downloads last month
- 9