forked from danielmiessler/SecLists
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Improve readme files for better clarity and usage examples
Related to danielmiessler#929 Update README.md files to provide better guidance on using wordlists. * **Discovery/Web-Content/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. * **Discovery/DNS/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. * **Discovery/Web-Content/api/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples. * **Discovery/Web-Content/URLs/README.md** - Add sections "Overview," "Usage," "Source," and "References" for each wordlist. - Include examples and tutorials for using the wordlists. - Provide step-by-step instructions and command examples.
- Loading branch information
1 parent
38a9962
commit 6b931eb
Showing
4 changed files
with
201 additions
and
36 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,13 +1,29 @@ | ||
## combined_subdomains | ||
# DNS discovery wordlists | ||
|
||
## combined_subdomains.txt | ||
|
||
### Overview | ||
This wordlist is a combination of the following wordlists with a few subdomains added: | ||
- bitquark-subdomains-top100000.txt | ||
- shubs-subdomains.txt | ||
- subdomains-top1million-110000.txt | ||
|
||
## `subdomains-top1million-*` | ||
### Usage | ||
Use for: discovering subdomains | ||
|
||
### Source | ||
This list is automatically updated by a GitHub action whenever any of the lists it's composed by is modified. | ||
|
||
## subdomains-top1million-110000.txt | ||
|
||
### Overview | ||
These wordlists were [zone-transferred from Amazon's Alexa.com](https://gist.github.com/ethicalhack3r/6145925) in 2015. They are lists of the most used subdomains at the time, as reported by Alexa.com. | ||
|
||
### Usage | ||
Use for: discovering subdomains | ||
|
||
> [!WARNING] | ||
> These wordlists are several years old, they were made in 2015. You will not be able to detect deployments of any services which were invented after 2015 using these wordlists, because their names will not be on the lists. | ||
### Source | ||
Source: https://gist.github.com/ethicalhack3r/6145925 | ||
|
||
These wordlists were [zone-transfered from Amazon's Alexa.com](https://gist.github.com/ethicalhack3r/6145925) in 2015. They are lists of the most used subdomains at the time, as reported by Alexa.com. | ||
### References | ||
- [Zone Transfer from Alexa.com](https://gist.github.com/ethicalhack3r/6145925) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1,55 @@ | ||
The URLs directory will hold numerous lists of URLs for common systems that one may attack, e.g. WordPress, Drupal, etc. These lists can be passed through an intercepting proxy in order to populate a site tree with whitebox-like knowledge. | ||
# URLs Wordlist | ||
|
||
A wordlist of URLs for common systems that one may attack, e.g. WordPress, Drupal, etc. | ||
|
||
## urls-Drupal-7.20.txt | ||
|
||
### Overview | ||
This file contains URLs for Drupal 7.20. | ||
|
||
### Usage | ||
Use for: populating a site tree with whitebox-like knowledge | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## urls-joomla-3.0.3.txt | ||
|
||
### Overview | ||
This file contains URLs for Joomla 3.0.3. | ||
|
||
### Usage | ||
Use for: populating a site tree with whitebox-like knowledge | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## urls-SAP.txt | ||
|
||
### Overview | ||
This file contains URLs for SAP. | ||
|
||
### Usage | ||
Use for: populating a site tree with whitebox-like knowledge | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## urls-wordpress-3.3.1.txt | ||
|
||
### Overview | ||
This file contains URLs for WordPress 3.3.1. | ||
|
||
### Usage | ||
Use for: populating a site tree with whitebox-like knowledge | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## Usage Instructions | ||
|
||
1. Download the desired URL wordlist file. | ||
2. Use an intercepting proxy (e.g., Burp Suite) to pass the URLs through and populate a site tree with whitebox-like knowledge. | ||
3. Analyze the site tree to identify potential vulnerabilities and attack vectors. | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,24 +1,105 @@ | ||
# api_wordlist | ||
# API Wordlist | ||
|
||
A wordlist of API names used for fuzzing web application APIs. | ||
|
||
## Contents | ||
* api_seen_in_wild.txt - This contains API function names I've seen in the wild. | ||
* actions.txt - All API function name verbs | ||
* objects.txt - All API function name nouns | ||
* actions-uppercase.txt - API function name verbs with leading character upper-case | ||
* actions-lowercase.txt - API function name verbs with leading character lower-case | ||
* objects-uppercase.txt - API function name nouns with leading character upper-case | ||
* objects-lowercase.txt - API function name nouns with leading character lower-case | ||
* api-endpoints-res.txt - Combination of all of the files above | ||
|
||
## Usage | ||
1. In burpsuite, send an API request you want to fuzz to Intruder. | ||
2. Remove the existing API function call, and replace it with two § characters for each text file you want to use. | ||
3. On the "Positions" tab, set Attack type to "Cluster Bomb". | ||
4. On the "Payloads" tab, select 1 for the fist Payload set drop-down, then select a Payload type of "Runtime file" and navigate to the directory you downloaded these text files to. Select "actions.txt". | ||
5. Repeat step 4 by setting Payload set 2 to "objects.txt". | ||
6. (optional step - add more payload sets and set them to "objects.txt" to test for multi-part objects like "UserAccount") | ||
7. Start attack! | ||
## api_seen_in_wild.txt | ||
|
||
### Overview | ||
This file contains API function names that have been observed in the wild. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## actions.txt | ||
|
||
### Overview | ||
This file contains all API function name verbs. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## objects.txt | ||
|
||
### Overview | ||
This file contains all API function name nouns. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## actions-uppercase.txt | ||
|
||
### Overview | ||
This file contains API function name verbs with the leading character in upper-case. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## actions-lowercase.txt | ||
|
||
### Overview | ||
This file contains API function name verbs with the leading character in lower-case. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## objects-uppercase.txt | ||
|
||
### Overview | ||
This file contains API function name nouns with the leading character in upper-case. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## objects-lowercase.txt | ||
|
||
### Overview | ||
This file contains API function name nouns with the leading character in lower-case. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## api-endpoints-res.txt | ||
|
||
### Overview | ||
This file is a combination of all the files above. | ||
|
||
### Usage | ||
Use for: fuzzing web application APIs | ||
|
||
### Source | ||
Source: Collected from various sources | ||
|
||
## Usage Instructions | ||
|
||
1. In Burp Suite, send an API request you want to fuzz to Intruder. | ||
2. Remove the existing API function call, and replace it with two § characters for each text file you want to use. | ||
3. On the "Positions" tab, set Attack type to "Cluster Bomb". | ||
4. On the "Payloads" tab, select 1 for the first Payload set drop-down, then select a Payload type of "Runtime file" and navigate to the directory you downloaded these text files to. Select "actions.txt". | ||
5. Repeat step 4 by setting Payload set 2 to "objects.txt". | ||
6. (Optional step - add more payload sets and set them to "objects.txt" to test for multi-part objects like "UserAccount") | ||
7. Start the attack! | ||
|
||
## Comments | ||
|
||
If you use this and it's helpful, I'd love to hear about it! (@dagorim). If you think I've missed any obvious word choices, I'd love to hear about that as well, or feel free to add them. |