TS 中文文档 TS 中文文档
指南
GitHub (opens new window)
指南
GitHub (opens new window)
  • 入门教程

    • TypeScript 手册
    • 基础知识
    • 日常类型
    • 类型缩小
    • 更多关于函数
    • 对象类型
    • 从类型创建类型
    • 泛型
    • Keyof 类型运算符
    • Typeof 类型运算符
    • 索引访问类型
    • 条件类型
    • 映射类型
    • 模板字面类型
    • 类
    • 模块
  • 参考手册

  • 项目配置

AWAE-Preparation


This repository will contain all trainings and tutorials I have done/read to prepare for OSWE.

Course Syllabus:


https://www.offensive-security.com/documentation/awae-syllabus.pdf

Before AWAE:


I would not recommend taking the course before at least; finishing all SQL and XSS Injection challenges in bWAPP https://sourceforge.net/projects/bwapp/files/bee-box/ and being able to understand and debug different languages like C#, Php, Java, and Javascript.

#### Cross-Site Scripting:

https://xhr.spec.whatwg.org/

#### Session Hijacking

https://popped.io/hijacking-sessions-using-socat/
https://pentesterlab.com/exercises/xss_and_mysql_file/course

#### Persistent Cross-Site Scripting

https://www.acunetix.com/blog/articles/persistent-xss/
https://portswigger.net/web-security/cross-site-scripting

#### Cross-Site Request Forgery

https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html

#### XSS and MySQL

https://www.vulnhub.com/entry/pentester-lab-xss-and-mysql-file,66/

#### Bypassing File Upload Restrictions:

https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf
http://www.securityidiots.com/Web-Pentest/hacking-website-by-shell-uploading.html
https://www.owasp.org/index.php/Unrestricted_File_Upload
Popcorn machine from HackTheBox
Vault machine from HackTheBox

#### PHP Type Juggling:

https://www.owasp.org/images/6/6b/PHPMagicTricks-TypeJuggling.pdf
https://medium.com/@Q2hpY2tlblB3bnk/php-type-juggling-c34a10630b10
https://foxglovesecurity.com/2017/02/07/type-juggling-and-php-object-injection-and-sqli-oh-my/
https://www.netsparker.com/blog/web-security/php-type-juggling-vulnerabilities/
http://turbochaos.blogspot.com/2013/08/exploiting-exotic-bugs-php-type-juggling.html
https://www.netsparker.com/blog/web-security/type-juggling-authentication-bypass-cms-made-simple/
https://www.php.net/manual/en/types.comparisons.php
https://github.com/spaze/hashes
https://www.whitehatsec.com/blog/magic-hashes/
Falafel machine from HackTheBox

#### Deserialization:

https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html
https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf
https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Deserialization_Cheat_Sheet.md
https://2017.zeronights.org/wp-content/uploads/materials/ZN17_Aleksei%20Tiurin_Deserialization%20vulnerabilities.pdf
https://www.exploit-db.com/docs/english/44756-deserialization-vulnerability.pdf
https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf

#### .NET Deserialization:

https://media.blackhat.com/bh-us-12/Briefings/Forshaw/BH_US_12_Forshaw_Are_You_My_Type_WP.pdf
https://github.com/pwntester/ysoserial.net
https://github.com/0xd4d/dnSpy

#### Java Deserialization:

https://www.n00py.io/2017/11/exploiting-blind-java-deserialization-with-burp-and-ysoserial/
https://www.owasp.org/images/7/71/GOD16-Deserialization.pdf
https://github.com/frohoff/ysoserial
https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet/blob/master/README.md
https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/

#### JavaScript Injection:

https://ckarande.gitbooks.io/owasp-nodegoat-tutorial/content/tutorial/a1_-_server_side_js_injection.html
https://capacitorset.github.io/mathjs/

#### NodeJS:

https://maikthulhu.github.io/2019-05-17-remote-debugging-node-vscode/
https://github.com/ajinabraham/Node.Js-Security-Course
https://www.acunetix.com/blog/web-security-zone/deserialization-vulnerabilities-attacking-deserialization-in-js/
https://www.yeahhub.com/nodejs-deserialization-attack-detailed-tutorial-2018/
Celestial machine from HackTheBox

#### SQLi:

https://pentesterlab.com/exercises/from_sqli_to_shell/course
https://www.acunetix.com/websitesecurity/blind-sql-injection/

#### PostgreSQL

http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet
http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt
https://www.exploit-db.com/papers/13084
http://www.postgresqltutorial.com/postgresql-string-functions/
https://www.linuxtopia.org/online_books/database_guides/Practical_PostgreSQL_database/c7547_002.htm
https://www.infigo.hr/files/INFIGO-TD-2009-04_PostgreSQL_injection_ENG.pdf
https://dotcppfile.wordpress.com/2014/07/12/blind-postgresql-sql-injection-tutorial/

#### Long Readings:

Use of Deserialization in .NET Framework Methods and Classes. https://www.nccgroup.trust/globalassets/our-research/uk/images/whitepaper-new.pdf
https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf

Before The Exam:


The Web Application Hacker's Handbookis your friend. The negative part of AWAE course is that they did not include enough methodologies for vulnerability discovery, thus, I strongly recommend reading Chapter 21 from The Web Application Hacker's Handbook, and be comfortable debugging C#, Java, Php, and Javascript, using Burp Suite, dnSpy, JD-GUI, Visual Studio, and writing custom PoC in at least one language :).

🐦@Mohdcsec
Last Updated: 2023-09-03 17:10:52