Posts

Showing posts from July, 2023

Offensive Security Tool: Go365

Image
Description Go365 by optiv, is a tool designed to help security professionals and researchers perform user enumeration  and password guessing attacks on organizations that use Office365 . Go365 uses a unique SOAP API endpoint on login.microsoftonline.com that most other tools do not use . When queried with an email address and password , the endpoint responds with an Azure AD Authentication and Authorization code . This code is then processed by Go365 and the result is printed to screen or an output file . User enumeration is performed in conjunction with a password guess attempt . Thus, there is no specific flag or functionality to perform only user enumeration. Instead, conduct your first password guessing attack , then parse the results for valid users . Notes : This tool might not work on all domains that utilize o365. Tests show that it works with most federated domains . Some domains will only report valid users even if a valid password is also provided . Your results...

SQL Injection in The HTTP Custom Header

Image
It has been a long time since my last write-up . in this short write up I wanna share my last year's findings about SQL Injection that I found in the custom HTTP header request . So, I was doing my API penetration testing for a target. let's say redacted.com and after successful login, the request has one more HTTP header in the request , User header, and the value is a username that login to the application. POST /abcd/abcd Authorization: token Host: redacted.com User: user.abc Postman-Token: token ... {body request} Now, I try to change the username for IDOR possibility but the server validates it by giving a message with a 500 internal error code and an error message that cannot get this API access . Because this parameter is validated it is potential also for SQL Injection , so I put basic SQL Injection to the request ‘ OR 1=1- - and send the request and with ease, the server accepts the request and gives valid information. No way :D Okay, we got a valid SQL Inje...