Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Pentesting the Web

** MENU **

👀🔥 attacks

🔥 OWASP Top 10 🔥

owasp-top-10-mapping

👀🕶️ rotate-ip

# set the proxy ip rotator
curl https://raw.githubusercontent.com/TheSpeedX/SOCKS-List/master/http.txt -o http.txt
docker run --network host -it mubeng -a localhost:8089 -f http.txt -r 10 -m random

👀🧠 status-code

👀🧠 tools

# run waf-bypass
docker run --network host -it 7209816c0627 --host='contoso.com' --proxy='http://localhost:8089'

# to select one payload we need to exclude all others
--exclude-dir='FP' \
--exclude-dir='API' \
--exclude-dir='CM' \
--exclude-dir='GraphQL' \
--exclude-dir='LDAP' \
--exclude-dir='LFI' \
--exclude-dir='MFD' \
--exclude-dir='NoSQLi' \
--exclude-dir='OR' \
--exclude-dir='RCE' \
--exclude-dir='RFI' \
--exclude-dir='SQLi' \
--exclude-dir='SSI' \
--exclude-dir='SSRF' \
--exclude-dir='SSTI' \
--exclude-dir='UWA' \
--exclude-dir='XSS' \

👀🎯 labs