Jason Haddix
Jason Haddix

@Jhaddix

9 Tweets 6 reads May 06, 2022
Here's another "meta" long-form hacking tip that has paid its weight in gold.
== Don't rely on TOO much automation ==
A thread 🧡
🚨follow, retweet, & like for more 🚨
Some examples:
πŸ‘‡
1/x
In Recon:
Let's start with subdomain enumeration techniques.
Tools like Amass & Subfinder are just tools using web API's & scraping to pull subdomains from datasets on the internet...
2/x
πŸ‘‡
However, it's been shown live by many hackers (like @NahamSec) that working with a dataset or website directly, like cert.sh , can find nested subdomains, or more results than a tool.
Why does this happen? Parsing is hard, rate limits exist, etc.
3/x
πŸ‘‡
Another example in recon, Screenshotting:
Using a screenshot tool on live web servers can miss things due to timing, complex redirects, cert issues, cloud/CDN configs, etc.
Many testers notice this right away if they ever switch to just opening URLs in browser.
4/x
πŸ‘‡
JavaScript parsing is another example. LinkFinder or derivatives give:
Full URLs
Absolute URLs or dotted URLs
Relative URLs with at least one slash
Relative URLs without a slash
But will not give you anything for minified or obfuscated js
6/x
πŸ‘‡
Finally, and known by most: Vuln Scanners.
Even dynamic ones are just throwing injection strings against parameters and routes. They then parse the page returned looking for a set of conditions and if X condition(s) are met (usually a regex) then they alert you...
7/x
πŸ‘‡
What you miss out on is the context around the fuzzing:
the error codes/text
the return time
the content size
etc
It's all invisible to you in most cmdline tools and each of those could lead you to a juicy bug.
8/x
πŸ‘‡
So, throw your automation out the window right?!
No πŸ˜…
Use your intuition/judgment when testing. Know what your tools are doing & what they can miss. Learn to love manual testing, slow & deep testing can yield great returns.
🚨follow, retweet, & like for hacker tips🚨
9/x

Loading suggestions...