Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/d34db33f-1007/fuzz300
Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links with data.
https://github.com/d34db33f-1007/fuzz300
Last synced: 11 days ago
JSON representation
Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links with data.
- Host: GitHub
- URL: https://github.com/d34db33f-1007/fuzz300
- Owner: d34db33f-1007
- License: mit
- Created: 2022-01-08T00:36:20.000Z (almost 3 years ago)
- Default Branch: master
- Last Pushed: 2022-12-02T03:17:54.000Z (almost 2 years ago)
- Last Synced: 2024-08-02T05:23:11.637Z (3 months ago)
- Language: Python
- Homepage:
- Size: 73.2 KB
- Stars: 37
- Watchers: 3
- Forks: 6
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-blazingly-fast - fuzz300 - Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links with data. (Python)
README
After Golismero project got dead there is no more any up to date open-source tool that can collect links with parametrs and web-forms and then test them, so i decided to write one by my own. At the first step this tool does collect all the entry-points for the target website and then tryes to find open redirect vulnerability.
Why this project is better than other open-redirect scanners? It does recursevely crawl all the links from the target website and finds potential vulnerable web-forms by itself instead of using CommonCrawl or getting links list from user input. In the future i will probably add more modules to fuzz for SQL Injections and XSS.
### Instalation
`~$ git clone https://github.com/d34db33f-1007/fuzz300.git`
`~$ pip3 install -r requirements.txt`### Usage
`~$ python3.8 fuzz300.py -u https://example.com`
`~$ python3.8 fuzz300.py -u https://www.example.com -c 'Cookie: user=admin'`After running you will also find newly created files with interesting links and all website entry-points.
### Tips
• Try using the same parameter twice: `?next=whitelisted.com&next=google.com`
• If periods filtered, use an IPv4 address in decimal notation http://www.geektools.com/geektools-cgi/ipconv.cgi
• Try a double-URL and triple-URL encoded version of payloads
• Try redirecting to an IP address (instead of a domain) using different notations: IPv6, IPv4 in decimal, hex or octal
• For XSS, try replacing `alert(1)` with `prompt(1)` & `confirm(1)`
• If extension checked, try `?image_url={payload}/.jpg`
• Try `target.com/?redirect_url=.uk` (or [any_param]=.uk). If it redirects to target.com.uk, then it’s vulnerable! target.com.uk and target.com are different domains.
• Use `/U+e280` RIGHT-TO-LEFT OVERRIDE: `https://whitelisted.com@%E2%80%[email protected]`
------ The unicode character `U+202E` changes all subsequent text to be right-to-left
------ E.g.: https://hackerone.com/reports/299403### Exploitation
• Phishing
• Chaining open redirect with
-- • SSRF
-- • OAuth token disclosure
-- • XSS
-- • CRLF injection### Open redirect writeups
• [Hackerone report 158434](https://hackerone.com/reports/158434): Open Redirect & XSS on Shopify, $1,000
• [Hackerone report 101962](https://hackerone.com/reports/101962): Open Redirect on Shopify, $500
• [Hackerone report 55546](https://hackerone.com/reports/55546): Open Redirect on Shopify, $500
• [Hackerone report 55525](https://hackerone.com/reports/55525): Open Redirect on Shopify, $500
• [Hackerone report 169759](https://hackerone.com/reports/169759): Open Redirect on Shopify, $500
• [Hackerone report 160047](https://hackerone.com/reports/160047): Open Redirect on Shopify, $500
• [Hackerone report 103772](https://hackerone.com/reports/103772): Open Redirect on Shopify, $500
• [Hackerone report 159522](https://hackerone.com/reports/159522): Open Redirect on Shopify, $500