Epic Wordlists for Bug Bounty content discovery and API bugs!

STΓ–K
26 Nov 202006:23

Summary

TLDRIn this episode, the host discusses the importance of wordlists for pen testers and bounty hunters, highlighting Assetnote's curated wordlists and their monthly updated Wordless site. John Barber's script for cleaning up wordlists is praised for its efficiency. Low View High's script for finding security anomalies through header and path testing is introduced, along with Project Discovery's Nuclei scanning tool's update to version 2.2, which includes new features like unsafe attributes and HTTP fuzzing support. The episode ends with an announcement of an upcoming live performance by rapper Whitey Cracker.

Takeaways

  • πŸŽ₯ Today's episode is sponsored by Pentester Lab, promoting their platform for learning penetration testing skills.
  • πŸ” Wordlists are crucial for content discovery and enumerating subdomains in cybersecurity.
  • πŸ“ˆ Assetnote has released a curated selection of wordlists, including an API routes wordlist with approximately 953,000 entries.
  • πŸ›  John Barber has created a script to clean up wordlists, removing unnecessary lines and noise to improve efficiency.
  • 🚫 The script by John Barber removes lines with over 100 characters, consecutive digits, and specific file formats to refine wordlists.
  • πŸ”„ Low View High's script helps identify security anomalies by testing various headers and path bypasses.
  • πŸ“ The nuclei scanning tool has been updated to version 2.2, introducing new features like unsafe attributes and raw HTTP library support.
  • 🏎️ The update to nuclei allows for more control over malformed requests, opening up possibilities for detecting race conditions.
  • 🀝 Nuclei's update also includes support for Burp Collaborator polling, enhancing the tool's capabilities in security testing.
  • 🎀 Integrity will host a live session with rapper Whitey Cracker on their YouTube channel, promoting the artist and engaging the audience.

Q & A

  • What is the main topic of the video script?

    -The main topic of the video script is about various updates and tools in the field of cybersecurity, specifically focusing on pen testing and bounty hunting tools and techniques.

  • Who sponsors the episode mentioned in the script?

    -The episode is sponsored by the team at Pentester Lab.

  • What is the purpose of Wordlist in cybersecurity?

    -Wordlists are used for content discovery, enumerating subdomains, and other enumeration tasks in cybersecurity.

  • What did Assetnote release that excited the speaker?

    -Assetnote released a curated selection of wordlists they have created over the year, which includes an API routes wordlist containing approximately 953,000 possible API paths from the HTTP Archive dataset.

  • What did John the Ripper do with the wordlist released by Assetnote?

    -John the Ripper cleaned up the wordlist by removing noisy characters and lines that are not needed, such as those with over 100 characters, consecutive digits, or ending with image and music file formats.

  • What is the benefit of using John the Ripper's script on wordlists?

    -Using John the Ripper's script helps to remove unnecessary noise from wordlists, making them more efficient and relevant for use in pen testing, thus reducing unnecessary requests and potential false positives.

  • What is the purpose of the script created by Low View High?

    -The script created by Low View High is designed to find anomalies in security measures that the security team or app developers might have overlooked. It tries different headers and path bypasses to identify vulnerabilities.

  • What is the significance of the update to the Nuclei scanning tool?

    -The update to Nuclei version 2.2 introduces a raw HTTP library with an unsafe attribute, allowing for the sending of any kind of malformed request to detect interesting behavior and providing unlimited control over the send requests.

  • What new features does the updated Nuclei tool offer?

    -The updated Nuclei tool offers new features such as HTTP flooding, fuzzing support, and the ability to add support for Burp Collaborative polling.

  • What event is Integrity hosting with Whitey Cracker?

    -Integrity is hosting a live session with the rapper Whitey Cracker for the 1337 UP Live Session.

  • Where can viewers find the live performance by Whitey Cracker?

    -Viewers can find the live performance by Whitey Cracker on Integrity's YouTube channel.

Outlines

00:00

πŸ” Penetration Testing Tools and Techniques

In this segment, the speaker introduces the importance of 'wordless' in the toolkit of a penetration tester or bounty hunter, emphasizing its use for content discovery and subdomain enumeration. The speaker then discusses the release of curated word lists by Assetnote, which includes a monthly updated wordlist site and a script by John Barber to clean up and refine word lists. The script removes unnecessary characters and lines, focusing on relevance and efficiency in penetration testing. The speaker also mentions a script by Low View High for finding security anomalies through various header and path bypasses, suggesting its potential for automation and integration with tools like httpx and ffuf. Lastly, the speaker talks about the update to the project discovery's scanning tool Nuclei, version 2.2, which introduces new features like unsafe attribute, raw HTTP library support, and the ability to send malformed requests to detect interesting behaviors, including potential race conditions.

05:01

🎀 Upcoming Live Session with Whitey Cracker

The speaker announces an upcoming live session on Integrity's YouTube channel featuring the rapper Whitey Cracker. The live performance is part of the 1337 UP live session series and is scheduled for the 27th of November. The speaker encourages viewers to tune in for the live performance or to check out Whitey Cracker's Soundcloud for nerdcore beats in anticipation of the event. The segment concludes with a teaser for the next episode, indicating that the speaker plans to release a couple of episodes before taking a break in January.

Mindmap

Keywords

πŸ’‘Wordlist

A wordlist in the context of the video refers to a collection of words or terms used for various security testing purposes, such as content discovery and enumerating subdomains. The video highlights the importance of good wordlists in pen testing and bounty hunting, mentioning that Assetnote has created a wordlist site that updates monthly and includes curated lists. The wordlist is crucial as it aids in identifying potential vulnerabilities or hidden resources within a target's infrastructure.

πŸ’‘Penetration Testing (Pen Testing)

Penetration testing, often shortened to pen testing, is the practice of testing a computer system, network, or web application to find vulnerabilities that an attacker could exploit. In the video, pen testing is mentioned as a key area where wordlists are essential tools for discovering and testing security weaknesses in systems.

πŸ’‘Bounty Hunter

In the cybersecurity realm, a bounty hunter refers to an individual who actively searches for and reports security vulnerabilities in software or systems in exchange for bounties or rewards. The video is titled 'Bounty Thursdays,' indicating that it is focused on content relevant to cybersecurity bounty hunters, including the use of wordlists for discovering vulnerabilities.

πŸ’‘Content Discovery

Content discovery is the process of identifying and mapping out the content of a website or network. In the video, this is related to using wordlists to enumerate subdomains and other resources that might be overlooked but could pose security risks. It's a critical part of the initial reconnaissance phase in both pen testing and bounty hunting.

πŸ’‘Subdomains

Subdomains are subsets of a primary domain, like 'blog.example.com' where 'blog' is the subdomain of 'example.com'. The video discusses the use of wordlists for enumerating subdomains, which is a technique used to find all the different parts of a domain that might be used to host different services or applications, potentially revealing hidden entry points for security testing.

πŸ’‘API Routes

API routes refer to the endpoints or paths used to access specific functionalities provided by an application programming interface (API). The video mentions the addition of an API routes wordlist containing a large number of possible API paths from the HTTP Archive dataset, which can be used to discover and test APIs for vulnerabilities.

πŸ’‘Scripting

Scripting, as mentioned in the video, involves writing small programs or scripts to automate tasks, such as cleaning up wordlists or performing security tests. John Barber is highlighted for creating a script to clean wordlists by removing unnecessary lines and characters, which is a practical example of how scripting can enhance the efficiency of security testing.

πŸ’‘Curl

Curl is a command-line tool used for transferring data with URLs. In the video, it is mentioned as part of a simple bash script that uses curl to perform various security tests, including header and path bypasses. Curl is a common tool in the arsenal of security professionals for making HTTP requests to test web services.

πŸ’‘Nuclei

Nuclei is an open-source project discovery and vulnerability scanning tool. The video discusses an update to Nuclei, version 2.2, which includes new features like the unsafe attribute for sending malformed requests and support for race conditions. This update is significant because it expands the capabilities of security testers to discover and exploit a wider range of potential vulnerabilities.

πŸ’‘Race Conditions

A race condition in computing is a situation where the system's response depends on the sequence or timing of other uncontrollable events. It's a type of bug that can lead to unexpected outcomes. The video suggests that the updated Nuclei tool allows for playing around with race conditions, which could help security testers identify and exploit timing-related vulnerabilities in systems.

πŸ’‘Burp Collaborative Polling

Burp Collaborative Polling is a feature mentioned in the context of the updated Nuclei tool. It allows for the sharing of findings between different instances of the Burp Suite, a widely used web vulnerability scanner. This feature is beneficial for collaborative security testing efforts, where multiple testers can share and verify findings more efficiently.

Highlights

Sponsorship by Pentester Lab for enhancing pen testing skills.

Introduction of Wordless as a vital tool for content discovery and subdomain enumeration.

Assetnote's release of curated word lists for improved pen testing.

Comparison to the impact of Cyclists on the pen testing field.

Job's tweet emphasizing the importance of good word lists for asset discovery.

Introduction of Assetnote's wordlist site with monthly updates.

Release of an API routes word list containing over 953,000 possible API paths.

John Barber's script to clean up and optimize word lists.

Script's functionality to remove noisy characters and irrelevant lines from word lists.

Low View High's script to find security anomalies through various header and path bypasses.

Potential for automating the script to work with tools like httpx and ffuf.

Update to Project Discovery's Nuclei scanning tool to version 2.2 with new features.

New release of Nuclei allows sending malformed requests to detect interesting behaviors.

Mention of potential race condition testing similar to Turbo Intruder.

Addition of HTTP polling and fuzzing support in Nuclei.

Integration of Burp Collaborative Polling in Nuclei for collaborative security testing.

Upcoming live session with rapper Whitey Cracker by Integrity.

Encouragement for listeners to stay curious and tune in for the next episode.

Transcripts

play00:00

hi my name is stuck and this

play00:03

is bounty thursdays

play00:05

[Music]

play00:13

today's episode is sponsored by no other

play00:15

than the amazing team over

play00:17

at pentester lab if you want to up your

play00:20

pen testing game and

play00:21

start from the beginning to advanced

play00:23

check out pentasyslab.com

play00:26

okay so wordless is a really important

play00:28

part of any

play00:30

pen tester or bounty hunters tool kit

play00:34

it's used for content discovery or

play00:37

enumerating subdomains and other stuff

play00:39

so when the team over at asset note

play00:42

dropped

play00:43

a curated selection of some of the

play00:45

amazing word lists that they have

play00:46

created over the year

play00:48

i kind of lost it a bit that's so cool

play00:51

we haven't seen anything

play00:52

on this level since uh cyclists

play00:56

started to be really to the level where

play00:59

it is today

play01:00

so i'm just gonna read straight out what

play01:02

job said in this tweet

play01:04

good word lists are so important when

play01:06

discovering content

play01:07

on an asset at acid note we build a

play01:10

wordless site that

play01:12

updates itself on a monthly basis for

play01:14

added value we included some of our best

play01:16

word lists that we manually collected

play01:18

too

play01:18

and then just short after that another

play01:20

tweet came out i've just added the api

play01:22

routes word list containing

play01:24

953 000-ish

play01:27

possible api pass from the http archive

play01:30

data set

play01:31

downloaded over at wordlist.assetnote.io

play01:34

short after that was released john

play01:36

barber spent some time looking at these

play01:38

and

play01:39

find a really cool way to just clean up

play01:41

this word list a bit

play01:42

to you know purge them a bit

play01:45

remove some of the lines that aren't

play01:47

needed so he created a script

play01:49

that's really useful in any kind of case

play01:52

when you're creating word lists

play01:54

so it removes noisy characters any any

play01:58

line that has over 100 characters going

play01:59

to be removed

play02:01

um if there's more consecutive digits in

play02:04

the end

play02:04

it's most likely like an id is going to

play02:06

be removed there's a lot of small things

play02:09

that he added here that's gonna just

play02:11

remove all that extra stuff you know you

play02:14

probably don't need to fuss with

play02:16

something that ends with a image file

play02:19

format

play02:20

or music file format like mp3 or web or

play02:23

something

play02:24

so this is a really cool script i

play02:26

absolutely recommend you to use that on

play02:29

all your current word lists to remove

play02:31

that extra noise because

play02:33

even though requests are free um

play02:36

it's always nice to not shug everything

play02:39

that you have at a target so

play02:40

be a little bit polite and also it's

play02:43

good for you to

play02:44

know that what you're throwing at it's

play02:46

actually relevant

play02:47

otherwise it's just idiotic when you're

play02:49

doing all this fussing you end up with

play02:50

having a lot of for ones or three

play02:52

authentication things that are in your

play02:54

way you're like i wish i could bypass

play02:56

that

play02:57

low view high has created a really

play02:58

simple script that could help you with

play03:00

the process of

play03:01

finding the anomalies that the security

play03:04

team or

play03:04

the app developers hasn't really thought

play03:07

about so

play03:08

when you run the script it's going to

play03:09

try all these different headers

play03:11

it's going to try all these different

play03:13

path bypasses and all these other things

play03:15

it's really really useful and this is a

play03:18

simple bash script that uses curl

play03:20

um it's something that i think is worth

play03:23

building upon

play03:24

maybe maybe this could be automated so

play03:27

if you're

play03:28

running httpx and getting a 403 or ffuf

play03:31

or something it's going to just kick off

play03:32

and

play03:32

and do all these bypasses and see if you

play03:34

can get a 200.

play03:36

i i it has huge potentials for anyone

play03:39

that's interested in

play03:40

in just building upon it so definitely

play03:42

check out low view highs github repo

play03:44

and contribute to a bypass for xx

play03:48

the project discovery's template

play03:49

scanning tool nuclei

play03:51

has been updated to version 2.2 and it

play03:54

has a

play03:54

massive amount of cool new features i'm

play03:57

just going to read this straight out for

play03:58

you

play03:59

earlier versions of nuclei use the base

play04:01

go

play04:02

http library the requests were strictly

play04:04

validated and

play04:06

non-specific compliant requests were

play04:08

dropped

play04:09

the new release comes with a unsafe

play04:11

attribute

play04:12

using our raw http library which allows

play04:15

sending

play04:15

any kind of malform request to detect

play04:18

interesting behavior

play04:19

and allow unlimited control over the

play04:22

send requests

play04:23

and this will also open up potentials to

play04:25

play around with race conditions

play04:27

using the idea based around let's say

play04:30

turbo intruder where

play04:31

all the requests get skewed up and have

play04:33

a gate where

play04:34

in the end all the requests are being

play04:36

released at the same time with the same

play04:37

byte

play04:38

so we have a lot of really interesting

play04:40

ways to play around with this here

play04:42

you can also add some new http pooling

play04:45

and some fussing support yeah there's

play04:48

there's there's some really cool stuff

play04:50

in here

play04:51

you can also even add in support for

play04:54

a burp collaborative polling so if

play04:56

you're sending a request out and you

play04:57

want to make sure if it hits

play04:59

and and talks to your collaborator you

play05:01

you can just submit your

play05:02

burp collaborative bid there and see

play05:05

if you have a hit it's really

play05:08

interesting

play05:09

i love this kind of innovation when it's

play05:11

coming out and

play05:12

man i'm going to play around with 10

play05:14

plays that's for sure

play05:15

this friday that is tomorrow if you're

play05:18

watching it

play05:19

on thursday the 27th of november

play05:23

integrity is bringing our all-time

play05:26

favorite rapper whitey cracker

play05:28

live on the stage for the 1337

play05:32

up live session it's gonna be really

play05:35

cool so make sure you head over to the

play05:37

integrity's youtube channel to check

play05:39

that live performance out

play05:41

but if you want to start listening to

play05:43

the beast already now you can head over

play05:45

to whitey cracker

play05:46

soundcloud for some of those nice

play05:49

nerdcore beats this is about everything

play05:51

we have for this week but lo and behold

play05:54

the new episode will be out already next

play05:57

week

play05:58

because i'm gonna smash out a couple of

play06:00

episodes here uh

play06:01

for the for the end of the year before i

play06:05

take my break in january

play06:06

so until next time or until next week

play06:11

stay curious

play06:21

[Music]

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Pen TestingWordlistsCybersecurityBounty HuntingContent DiscoveryAPI TestingScriptingNuclei UpdatesSecurity ToolsLive Sessions