■ ■ ■ ■ ■ ■
CyberSecurity/Web/BountyStory/XSS/20230311 - How reading robots.txt file got me 4 XSS reports.md
| 1 | + | # How reading robots.txt file got me 4 XSS reports? 💡💡 |
| 2 | + | |
| 3 | + | ### 1. Start doing Google Dorking [Found Nothing] |
| 4 | + | |
| 5 | + | ### 2. Searched for the domain name at Wayback archive [Found Nothing] |
| 6 | + | |
| 7 | + | ### 3. Opened robots.txt file to see what the developer hide from us |
| 8 | + | |
| 9 | + | ### 4. Open source code > Search for any secrets or endpoints > [Found Nothing] |
| 10 | + | |
| 11 | + | ### 5. Open JS files > Use any tool like gospider to extract secrets and Endpoints > [Found Nothing] |
| 12 | + | |
| 13 | + | ### 6. Let’s FUZZ |
| 14 | + | `ffuf -u https://sub.domain.com/admin/FUZZ -w aspfiles.txt -mc 200` |
| 15 | + | |
| 16 | + | ### 7. Found Endpoint: |
| 17 | + | `https://sub.domain.com/admin/colorpicker_IEPatch.asp` |
| 18 | + | |
| 19 | + | ### 8. Use Arjun to find hidden parameter |
| 20 | + | `arjun -u https://sub.domain.com/admin/colorpicker_IEPatch.asp` |
| 21 | + | |
| 22 | + | ### 9. |
| 23 | + | |
| 24 | + | ### 10. Payload: |
| 25 | + | `</script><img src=x onerror=alert(document.cookie)>` |
| 26 | + | |
| 27 | + | |
| 28 | + | ## Credit |
| 29 | + | Based on [Ahmed Qaramany](https://c0nqr0r.medium.com/reading-robots-txt-got-me-4-xss-reports-9fd2234c635f)'s writeup. |
| 30 | + | <br> |
| 31 | + | |
| 32 | + | ## Support |
| 33 | + | You can Follow [me](https://twitter.com/MeAsHacker_HNA) on twitter or |
| 34 | + | <br><br><a href="https://www.buymeacoffee.com/NafisiAslH" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" style="height: 60px !important;width: 217px !important;" ></a> |
| 35 | + | |