Shuciran Pentesting Notes

NodeJS Debugging

Java Source Code Recovery

Java Source Code Recovery JAR files contain compiled Java classes and to recover the original Java source code from them we can make use of the JD-GUI decompiler. JD-GUI allows us to do that via ...

Java Decompilation

Decompiling Java Classes While there are many tools that we could use to decompile Java bytecode (with various degrees of success), we will use the JD-GUI decompiler in this course. Java-based web ...

Java Debugging

XSS Hunting

We’ll start our hunt for DOM-based XSS by searching for references to the document object. However, running a search for “document” will generate many false positives. Instead, we’ll search for “do...

DotNet Debugging

Manipulation of Assembly Attributes for Debugging Debugging .NET web applications can sometimes be a bit tricky due to the optimizations that are applied to the executables at runtime. One of the w...

DirtyCow Privilege Escalation

Exploit-DB (searchsploit) You can download the .cpp (C++) script with the following command: searchsploit -m linux/local/40847.cpp This is to compile within the compromised machine: g++ -Wall -p...

DotNet Source Code Review

Manipulation of Assembly Attributes for Debugging Debugging .NET web applications can sometimes be a bit tricky due to the optimizations that are applied to the executables at runtime. One of the w...

PHP Source Code Review

We decided to enumerate all pages we could access without authentication using a grep search and used the results as a starting point for our analysis. grep -rnw /var/www/html/ATutor -e "^.*user_l...

NodeJS Source Code Review

Assessing the Application The existence of bin/www, package.json, and routes/ indicate that this is a NodeJS web application. In particular, package.json identifies a NodeJS project and manages its...