text
stringlengths
0
174
This is the easiest bug you can find right now i.e
Finding misconfigured JS files information:
Ok so, Finding this vulnerability consist of 2 parts, first is finding all JS files of that website, second is finding misconfigured information from that extracted JS files.
Finding JS files:
For finding all JS files there are two most popular tools for this i.e. SubJS and Katana.
First Step: Install Katana
Second Step: Run Command
katana -list {domains.txt} -d 5 -jc | grep ".js$" | uniq | sort
Run this command to run katana for finding all JS files of provided list of domains.
Remember to add your list of subdomains of a particular website in place of {domains.txt} & configure it for your own ease.
And after some crawling it will show JS files. Remember to save them.
Third Step: Extracting sensitive information from JS files
For extracting all sensitive information we will be using a tool called SecretFinder.
Download SecretFinder (GitHub)
Now after installing SecretFinder then run the following command
cat {jsfilesgottenfromkatana.txt} | while read url; do python3
SecretFinder/SecretFinder.py -i $url -o cli; done
And it will display all possible credentials of all provided JS files fetched from katana
Now do whatever you want with it who cares . Hack the planet
gaga
awfaffa

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
9
Add dataset card