🟥Checklist
Bypass & Checklist
Register page
username = admin , ( check if admin user already exist or not )
username = admin'or'1'='1 , ( Try sql-injection and check if it gives any error or data )
Authentication Bypass
default / common credentials
sql injection
EAR - vulnerability
php type juggling
nosql injection
sql/Nosql injection by using json POST
json for type juggling
Input fields
Beside the fact that parameter name is anything , we must try all this :-
SSRF ( try with both python and nc server )
sql-injection
XSS
Other Vulnerabilities
EAR vulnerability
EAR - execution after redirection Basically , when you try to vistit the homapage "/" and the application redirect you to some other web page like "/login" or "/abc...." - their is where EAR takes place To bypass authentication :- just capture the request in burp -> do intercept response -> change the 302 Found to 200 Ok -> forward the request
Last updated