• Stars
    star
    130
  • Rank 277,575 (Top 6 %)
  • Language
  • License
    GNU General Publi...
  • Created over 3 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Bug Bounty Tools used on Twitch - Recon

Bug Bounty Methodology & Tools

BHEH

Black Hat Ethical Hacking

summary


Metrics


📫 How to reach me: [email protected]

A special thanks to all the star gazers, we see you!

Description

Here are some of the tools that we use when we perform Live Recon Passive ONLY on Twitch:

  1. Recon-ng https://github.com/lanmaster53/recon-ng
  2. httpx https://github.com/projectdiscovery/httpx
  3. isup.sh https://github.com/gitnepal/isup
  4. Arjun https://github.com/s0md3v/Arjun
  5. jSQL https://github.com/ron190/jsql-injection
  6. Smuggler https://github.com/defparam/smuggler
  7. Sn1per https://github.com/1N3/Sn1per
  8. Spiderfoot https://github.com/smicallef/spiderfoot
  9. Nuclei https://github.com/projectdiscovery/nuclei
  10. Jaeles https://github.com/jaeles-project/jaeles
  11. ChopChop https://github.com/michelin/ChopChop
  12. Inception https://github.com/proabiral/inception
  13. Eyewitness https://github.com/FortyNorthSecurity/EyeWitness
  14. Meg https://github.com/tomnomnom/meg
  15. Gau - Get All Urls https://github.com/lc/gau
  16. Snallygaster https://github.com/hannob/snallygaster
  17. NMAP https://github.com/nmap/nmap
  18. Waybackurls https://github.com/tomnomnom/waybackurls
  19. Gotty https://github.com/yudai/gotty
  20. GF https://github.com/tomnomnom/gf
  21. GF Patterns https://github.com/1ndianl33t/Gf-Patterns
  22. Paramspider https://github.com/devanshbatham/ParamSpider
  23. XSSER https://github.com/epsylon/xsser
  24. UPDOG https://github.com/sc0tfree/updog
  25. JSScanner https://github.com/dark-warlord14/JSScanner
  26. Takeover https://github.com/m4ll0k/takeover
  27. Keyhacks https://github.com/streaak/keyhacks
  28. S3 Bucket AIO Pwn https://github.com/blackhatethicalhacking/s3-buckets-aio-pwn
  29. BHEH Sub Pwner Recon https://github.com/blackhatethicalhacking/bheh-sub-pwner
  30. GitLeaks https://github.com/zricethezav/gitleaks
  31. Domain-2IP-Converter https://github.com/blackhatethicalhacking/Domain2IP-Converter
  32. Dalfox https://github.com/hahwul/dalfox
  33. Log4j Scanner https://github.com/Black-Hat-Ethical-Hacking/log4j-scan
  34. Osmedeus https://github.com/j3ssie/osmedeus
  35. getJS https://github.com/003random/getJS

Bounty Platform used:

Hexway

  • We respect the privacy of clients we are working on Hackerone.com & use only passive techniques, we do not share anything related to security misconfigurations, and everything is taken from passive resources, including the techniques performed.
  • The purpose is for Educational only!
  • We will update the list everytime we add/remove tools.
  • Some of the Methodologies we use during our Stream, since we had many requests to post it, here you go:

As seen on Hackerone.com Passive Bounty Focused for Quick Pwning:

Project Notes & Recon Approach Techniques:

Main Domain:

XXXX Enter from Scope XXXX

Secondary . Domains:

XXXX Enter from Scope XXXX

Single Sub-domains:

XXXX Enter from Scope XXXX

Passive Recon Techniques:

You can use also BHEH-SUB-PWNER New!

https://github.com/blackhatethicalhacking/bheh-sub-pwner

    1. Create Folders (Subdomains, URLS, IPs)
    1. Recon-ng - Recon Passively for subdomains/ips/ports/params/js
    1. Export lists from recon-ng and use httpx to create urls/probing (urls/IPs/Subdomains)
    1. Use isup.sh to filter ips

UPLOAD ALL RESULTS INTO PLATFORM

Note: If you see domain.* you have to use the below technique:

TLD Wordlist:

https://gist.githubusercontent.com/gingeleski/b01633b07183ff572198dd7e31bbd4b0/raw/5e015d43b4e7b692be49fb3f42f03e1693c370bb/domain_extensions_payloads.txt

Ctrl+H with regex mode enabled and replace ^ with domainname

Then Use :

https://github.com/blackhatethicalhacking/Domain2IP-Converter

Then Run subdomains using httpx for urls

Use updog to offer easier workflow when uploading/checking directories locally.

For example when using a raspberry pi, or VPS it helps uploading files locally on the machine.


5. Use Nmap Aggressive Scan & Save to XML to Import into Bounty Platform:

nmap -iL ips.txt -sSV -A -T4 -O -Pn -v -F -oX nmap2.xml

Extra Sn1per - WebApp Mode:

sniper -f /root/Desktop/Bounty/Airbnb/ips/valid-airbnb_ips.txt -m massweb -w airbnbtestweb

UPLOAD ALL RESULTS INTO PLATFORM

Examine Some Services Manually from the Cloud Platform Hive: New!

Use Metasploit + Searchsploit to manually search - note down certain areas of interest including Log4j Patterns.

This could take days/weeks - So, its a non stop process.

5b. Extra Osmedeus Scan New!

You can use on the list of IP addresses, a domain or list of URLs gathered Osemedeus with UI to go for more in depth recon/attacks on CVEs:

osmedeus server

for the UI

Directly run on vuln scan and directory scan on list of domains

osmedeus scan -f vuln-and-dirb -t list-of-domains.txt

Scan list of targets

osmedeus scan -T list_of_targets.txt

Get target from a stdin and start the scan with 2 concurrency

cat list_of_targets.txt | osmedeus scan -c 2

Start a simple scan with default 'general' flow

osmedeus scan -t sample.com

One Liner Very Powerful Techniques New!

Check for Heartbleed:

cat subdomains.txt | while read line ; do echo "QUIT" | openssl s_client -connect $line:443 2>&1 | grep 'server extension "heartbeat" (id=15)' || echo $line: safe; done

Extract Javascripts from domains, and fetch only the URLS from those big files, can also be used with any type of file containing huge data:

First use getJs to get the Javascripts:

getJS --url website.com --output /root/results.txt
getJS --input urls.txt --output /root/results.txt

Extract URLs directly or from a file using this one-liner:

From any type of file:

cat file | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*"*

Directly from a website:

curl https://domain.xx/file.js | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*"*

OSINT: (Can be done on RPI)

Check for Domain TakeOver with Takeover by M4llok

Takeover Tool:

takeover -l sub_domains.txt -v -t 10

**Check for open Amazon S3 buckets

ls | grep s3 from nuclei-templates/technologies

Can use nuclei -l urls.txt -t /root/nuclei-templates/technologies/s3-detect.yaml

Attack Buckets: New!

https://github.com/blackhatethicalhacking/s3-buckets-aio-pwn

  1. Use ParamSpider to Hunt for URLS with Parameters automatically from wayback machine - You can also use Arjun, we are switching to ParamSpider as part of building a workflow
python3 paramspider.py --domain DOMAINNAME.com --exclude woff,png,svg,php,jpg --output /root/Desktop/Bounty/params.txt

Technique to Clean Params from XSS:

sed 's/unix/linux/g' reconfile.txt
  1. Use Smuggler on URLs list to test for http requests that could desync, and posting multiple chunked requests to smuggle external sources so the backend server will forward the request with cookies, data to the front end server

(Can be done on RPI)

cat list_of_urls.txt | python3 smuggler.py -l /root/location.txt

Bonus

A) Eyewitness to take Screenshots of all URLS, Will run on VPS only! New!

eyewitness -f /root/Desktop/Bounty/Client/urls.txt
zip -r name.zip folder

Examine the Results Manually

B) Pattern Check Example for Results with gf & gf-patterns:

After you have the Parameters Gathered, we want to check for specific patterns and possible vulnerable URLs that can be attacked using Meg or other Fuzzing Tools.

cat /root/Desktop/Bounty/params.txt | gf xss | sed 's/FUZZ/ /g' >> /root/Desktop/Bounty/xss_params_forMeg.txt

Very Powerful One Liner - You can Pipe also directly to Meg.

  1. Use Meg with Seclist fuzzing for Links: (Gathered from gau/arjun/paramspider/gf)

For Meg, we must remove the ‘FUZZ’ from paramspider and replace it with a null character:

sed 's/FUZZ//g' reconfile.txt
meg -v LFI-gracefulsecurity-linux.txt /root/Desktop/Bounty/urls.txt /root/Desktop/urls.txt -s 200
  1. JSScanner:

Scanning Javascript Files for Endpoints, Secrets, Hardcoded credentials,IDOR, Openredirect and more

Paste URLS into alive.txt

Run script alive.txt - Examine the results using GF advanced patterns

Use tree command, cat into subdirectories:

cat * */*.txt
cat */*.js | gf api-keys	
cat /*/*.txt | gf ssrf > /root/Desktop/ssrf.txt

Or New Method with GitLeaks: New!

Scan a Directory with Javascripts, Files, Json Etc.. for Secrets!

gitleaks --path=/directory -v --no-git

Scan a File with Any Extension for Secrets!

gitleaks --path=/file.xxx -v --no-git
  1. Find XSS Vulnerabilities from Paramspider & Dalfox New!

Since we have params urls from paramspider, dalfox needs to know where to inject, and you can define it with XSS instead of FUZZ, so here is a command to replace this from the result, and create a new list to be used on dalfox.

sed 's/FUZZ/XSS/g' reconfile.txt

You are now ready for parsing the urls into dalfox in pipe mode:

cat /root/Desktop/Bounty/xss_params.txt | dalfox pipe | cut -d " " -f 2 > output.txt

or

dalfox file /root/Desktop/Bounty/xss_params.txt | cut -d " " -f 2 > output.txt

For Deeper Attacks add this:

--deep-domxss

Silence --silence Prints only PoC When found and progress

10 - After Recon: New!

When you find Keys/Tokens - Check from here: https://github.com/streaak/keyhacks


OSINT & Passive Amplified Attacks: (Raspberry Pi)

OSINT:

Perform OSINT using spiderfoot

One off 1337 Powerful Command Attacks with amass:

1. Nuclei:

amass enum -passive -d [subdomain] -v | httpx -verbose | nuclei -t /root/nuclei-templates/cves/ -o /root/Desktop/Bounty/location.txt

2. Jaeles:

amass enum -passive -d [Domain] -v | httpx -verbose | jaeles scan -s 'cves' -s 'sensitive' -s 'fuzz' -s ‘common' -s 'routines' report -o /root/Desktop/Bounty/reportname.txt --title "[Client] Jaeles Full Report"
  1. Use Eyewitness to take screenshots from URLs
eyewitness -f /root/Desktop/Bounty/Client/urls.txt

More Tools: chopchop / inception / jsql

./gochopchop scan --url-file /root/Desktop/Bounty/urls.txt --threads 4

Sn1per - Bounty Mode on Active Results

sniper -f /root/Desktop/Bounty/Airbnb/ips/valid-airbnb_ips.txt -m massweb -w airbnbtestweb

RPI Copy:

scp -P 7 /root/Desktop/test.txt [email protected]:/root

use Gotty - https://github.com/yudai/gotty

gotty -p 1337 -w recon-ng 

Gau - for realtime URL extraction when performing manual search so you can have urls to attack.

Hunt for Links that have Parameters by using gau (Get all URLS) and displaying all links that have params:

cat subdomains.txt | gau | tee /root/Desktop/urls.txt | lolcat
gau domains -o urls.txt
gau example.com
gau -o example-urls.txt example.com
gau -b png,jpg,gif example.com

You can watch us live on Twitch:

https://www.twitch.tv/bheh1337

blackhatethicalhacking.com // 2022// All Rights Reserved

Support

If you would like to support us, you can always buy us coffee(s)! 😊

Buy Me A Coffee

More Repositories

1

DDoSlayer

An Advanced Layer 7 DDoS tool written by Black Hat Ethical Hacking
Python
92
star
2

TerminatorZ

TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
Shell
49
star
3

ScopeHunter

ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.
Shell
32
star
4

XSSRocket

XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
Shell
32
star
5

bf_active_sub

Subdomain Bruteforce - Bounty Quick Code
Shell
24
star
6

SQLMutant

SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
Shell
22
star
7

SQL-INJECTION-PWN

A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty
Shell
19
star
8

s3-buckets-aio-pwn

An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
Shell
18
star
9

bheh-sub-pwner

This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save the results in a separate file, it will then resolve all the subdomains into ip addresses and save the results separately.
Shell
15
star
10

BHEH_PHP_SHELL

Black Hat Ethical Hacking | PHP Backdoor Shell v1.0
PHP
13
star
11

CVE-2020-2034-POC

Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal
Python
11
star
12

SecretOpt1c

SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
Shell
11
star
13

isitalive

This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!
Shell
10
star
14

Clone_BHEH_Offensive_Tools_v1

Clone Some BHEH Fav Tools
Shell
9
star
15

Domain2IP-Converter

Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty
Shell
8
star
16

bheh_conky_theme

Black Hat Ethical Hacking - Official Theme for Conky Manager
8
star
17

NucleiMonst3r

Nucleimonst3r is a powerful vulnerability scanner that provides red-teamers with quick and accurate results.
Shell
7
star
18

shodan_quick_recon

A Python Tool that uses Shodan API's to perform quick recon for vulnerabilities
Python
7
star
19

parrotfromdebian

Convert Your Debian Into Parrot OS Pentesting Mach1ne
Shell
6
star
20

cisco_asa_poc_xss

Cisco VPN Portal XSS PoC for Paypal
Python
5
star
21

DTK-CName-Checker-by-bheh

Shell
5
star
22

snort_installation_bheh

Installation Methods for Snort by Cisco IPS
5
star
23

Talk2Me

Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.
Shell
5
star
24

dalfox-burp-oneliner

Personal - Experimentation
Shell
5
star
25

howtoscanatargetblackhatstyle

How to Scan A Target - Black Hat Style - Recon is the heart of Hacking
4
star
26

NSA---Zippybeer

Testing Purposes
Python
4
star
27

SSRFPwned

Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF
Shell
3
star
28

Debian_Kali_Converter_GC

Convert Debian 10 to Kali Linux on Google Cloud or Any Debian
3
star
29

OpenRediWrecked

A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of carefully crafted payloads with encoding techniques.
Shell
3
star
30

bheh_zsh_config

BHEH Official Zsh Config
2
star
31

lazykali

Automatically exported from code.google.com/p/lazykali
Shell
2
star
32

bulkwhois

Bulk Whois, that can be saved to a text file for Recon Purposes
Shell
2
star
33

blackhatethicalhacking

Who We Are
2
star
34

d1rwrtutzhw795.cloudfront.net

2
star
35

antispoof

Anti Spoof - Blocks/Notifies when ARP Scans are Detected
Shell
2
star
36

updatemykalitwitch

A cool Script that updates your Kali Linux!
Shell
2
star
37

BHEH-OSINT

blackhatethicalhacking.com
2
star
38

payloads_pentesting

Payloads for Pentesting
1
star
39

fud

fud by month
1
star
40

corkami

Automatically exported from code.google.com/p/corkami
Assembly
1
star
41

reconinpython3

This is my python3 code
Python
1
star