Methodology
Methodology
Methodology
  • 🧑‍🏫My Methodologies
  • 🕶️Google Dorks
  • 🌀Possible "Content-Type" Header values
  • 📜Scripts written by me for XSS
  • 🔼Subdomain Takeover
  • ✍️Tips and Write-ups
  • 🔧Tools and their Uses
  • 🎯XSS nuclei template CVE-2023-24488.yaml
  • 🕵️Recon strategies by other Hackers
    • 🔎Blind SQL Injection Detection and Exploitation (Cheat Sheet)
    • 🔎How i got more than 100 vulnerabilities in just one site? (zseano-challenge)
    • 🔎JS is l0ve ❤️.
    • 🔎My top 5 bookmarks that I consistently use for bug bounty and penetration testing.
    • 🔎Find the treasure hidden inside JavaScript
    • 🔎Deep-Subdomains-Enumeration-Methodology
    • 🔎Extensive Recon Guide For Bug Hunting
    • 🔎Finding Time Based SQLi injections : Edition 2023
    • 🔎From Self XSS to Account Take Over(ATO)
    • 🔎How I hacked NASA and got 8 bugs ?
    • 🔎How I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?
    • 🔎Leakage of credential data for full control over the target.
    • 🔎Recon Like a Boss
    • 🔎Recon With Me
    • 🔎Simple Recon Methodology
    • 🔎SQL injection through HTTP headers
    • 🔎How to Get Unique Subdomains on Large scope
    • 🔎Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
  • 🎯subdomain-enumeration
  • 🛠️CRLF
  • ❌xss
  • ⛴️Ghetto XSS Cheatsheet
  • 🚀Oneliners
Powered by GitBook
On this page
  1. Recon strategies by other Hackers

How I hacked NASA and got 8 bugs ?

source: https://medium.com/@shari7a0x/how-i-hacked-nasa-and-get-8-bugs-e5cd397a6af9

PreviousFrom Self XSS to Account Take Over(ATO)NextHow I was able to find 4 Cross-site scripting (XSS) on vulnerability disclosure program ?

Last updated 1 year ago

Hi hackers ,

I will explain , How did i get 8 bugs in NASA .

It’s about 7 cross site scripting (xss) and one open redirect .

First step collect subdomains and check live domains .

I always use tool HTTPX .

subfinder -d host.com -silent | httpx -mc 200 -o live txt 

second step collecting parameters .

wait , are you real to collect parameters form domains by yourself ?

it’s many subdomains and paraspider can’t automate this alone .

I use simple bash script ,to automate collect parameters from subdomains .

for URL in $(</path-of-live-domains  ); do (python3 paramspider.py -d "${URL}" --level high  );done

little not before run this script you should open directory of Paramspider .

what after this ?

You want to check parameters if you can add (tags <>) .or not

Cat parameters.txt |kxss

what after this ?

Arjun -u host.com
Dalfox url host.com?parameters=xss
Nuclei -l parameters -t /fuzzing-templates/xss

I get open redirect by NUCLEI .

cat parameters.txt | grep "redirect" | NUCLEI -t /fuzzing-templates/redirect/open-redirect.yaml

if you think i finish you are wrong .

but that are two bug only , where are others ?

after i got first xss i had an idea , i can use some google dorks .

google dorks for xss !!!! yep .

some google dorks for discovering parameters

site:*.host.com ext:asp

site:*.host.com ext:jsp

site:*.host.com ext:aspx

site:*.host.com ext:jspx

site:*.host.com ext:do

site:*.host.com ext:action

I use them but didn't have useful parameters .

I check subdomain if i can use it to search about it in google .

I found something doesn’t see it usually it’s index.cgi .

I asked myself why didn’t try to use google dorks about it .

site: *.host.com ext:cgi

site:*.nasa.gov inurl:index.cgi

I see good result , i checked this result it’s like last domain ,that i had found xss in it ,I tried to use same parameter lol it is working nice .

I checked about 11 domains but 7 had xss .

thinks for reading .

give me feedback .

I always use tool and add to it some API’s .

I always use two tools and .

I used , it’s very nice tool but not work at all the time .

done .
I can write html code .

You can use tool for discovering hidden parameters also like and check parameters if it work, you can use tool like very cool tool .

boom xss is done .

You can use automation by EI . .

lol .

can you follow me in and

🕵️
🔎
subfinder
paramspider
waybackurls
KXSS
Arjun
dalfox
NUCL
templates
linked in
twitter