How To Improve Search The Vulnerability ( Version of Me :D )

by kcnewbie - 03-10-2016 at 05:25 AM
Security Analyze
Super Moderators
Posts:
35
Joined:
Mar 2016
Likes:
1
Reputation:
0
2 Year Of Member
#1
OP
Posted: 03-10-2016, 05:25 AM (This post was last modified: 03-10-2016, 10:49 AM by kcnewbie.)
Assalamualaikum semua.. :D

kali ini gw akan membagi ilmu gw yg sedikit ini ya.. haha :D  *( ilmu sedikit napa sok share share? :s )*
sorry .. bukanya napa.. tapi kalo di agama gw.. di kitabnya tertulis "sampaikan lah (pengetahuan) walau hanya 1 ayat"..
ckckck.. :D

ok kita mulai saja..
kalau gw biasanya nyari bug atau vulnerability gw pasti ngegunain mas Google, untuk membantu gw mempermudah dalam pencarian..
gw punya beberapa metode awam kek gw ini untuk berexplorasi.. berikut methode methode gw..

1. gw coba ulik ulik page page yang ada di web tersebut..
kita buka source code di web tersebut .. kan ada pecahan pecahan link di dalam.. coba aja buka buka..
siapa tau ada bug CSRF mungkin atau code injeksi.. ya maybe..

2. setelah gw uliik ulik source codenya.. 
gw coba beralih ke url nya.. setiap url kadang ada site yg menggunakan PHP .. ada yang HTML dll..
setiap web php .. kadang ada yg nongolin parameter nya seperti http://contohsite.com/index.php?id=2 ..
kadang gw coba coba cari 1 /1 gw tambahin string ' setelah parameter.. hahah... berharap ada bug sql inject di sana wkwk..

3. lalu gw ulik ulik lagi path website yg menjurus ke sana.. contoh .. ada page yg seperti ..
http://contohsite.com/anu.php?path=home.php << biasanya ini berpotensi LFI.. ckck..
ane coba coba deh cari di gugel exploit LFI.. ane coba test test di masing masing page yg seperti itu...


4. Jikalau sudah frustasi tingkat ultimate.. haha ..  :D kita coba pakai Web Application Scanner seperti eee..  :s ...
oh iya.. Uniscan truss... acunetix  truss.. dan kawan kawan lah ckck..

5. jika sudah frustasi tingkat super saiyan 3 ...  :D kita coba deh pakai teknik Social Engineering.. atau tekhnik kesalahan yg di manfaat kan dalam bersosialisasi.. ( melakukan pengakalan / ngakalin / boongin :D  )  teknik social engineering y kita pakai adalah ... soceng ke pihak domain registry... wkwk... 

6. ane coba gunakan gugel... ckck ane pake keyword ..
inurl:?id= ext:php site:www.situs.com



sekian methode yg singkat dan amat sedikit ini... dari ane noob yg kesepian ini .. ckck.... :D
semoga bisa membantu kalian yg sedang kebingungan mencarri DOI .. :v eh maksud ane mencari method untuk berexploitasi ria...



Thanks..
Zero-Security.id | BackBox Jakarta Team
Reply
Find Posts
Junior Member
Posts:
33
Joined:
Mar 2016
Likes:
0
Reputation:
0
2 Year Of Member
#2
Posted: 03-10-2016, 08:33 AM
komen ^_^ ~
Reply
Find Posts
Staff
Moderators
Posts:
45
Joined:
Mar 2016
Likes:
0
Reputation:
0
2 Year Of Member
#3
Posted: 03-10-2016, 09:27 AM (This post was last modified: 03-10-2016, 09:28 AM by Nue Bhandell.)
inurl:?id= ext:php site:situs.com
dorknya jadi emotikon om :v hehhee
Reply
Find Posts
Security Analyze
Super Moderators
Posts:
35
Joined:
Mar 2016
Likes:
1
Reputation:
0
2 Year Of Member
#4
OP
Posted: 03-10-2016, 10:47 AM
(03-10-2016, 09:27 AM)Nue Bhandell Wrote: inurl:?id= ext:php site:situs.com
dorknya jadi emotikon om :v hehhee

omaigat :v ane lupa.. oke ane fix dulu
Reply
Find Posts
Junior Member
Posts:
1
Joined:
Dec 2016
Likes:
0
Reputation:
0
2 Year Of Member
#5
Posted: 12-16-2016, 07:51 AM
kwkwk, pokoke thanks udah berbagi mas
Reply
Find Posts
Junior Member
Posts:
1
Joined:
Dec 2016
Likes:
0
Reputation:
0
2 Year Of Member
#6
Posted: 12-31-2016, 08:07 AM
mantang mang
Reply
Find Posts
Register an account or login to reply
Create an account
Create a free account today and start posting right away. It only takes a few seconds.
Login
Log into an existing account.
1 Guest(s)