File Extensions Handling
Check List
Methodology
Sensitive File Disclosure Via File Enumeration And Insecure File Upload
1
We open our browser and use the following command, which will find all sensitive files on the site, by entering the URL plus the target domain name
2
And then we can use the following commands to check for the presence of sensitive files such as XLS, PDF, CONF, etc. on the target
3
Using the following commands, we will check for file Uploader and scan different file types on the site using its own tool
4
We can create and run a script that does all this without errors, and if there is a sensitive file in the target, the vulnerability will be identified
Cheat Sheet
Forced Browsing
ext:log |
ext:txt |
ext:conf |
ext:cnf |
ext:ini |
ext:env |
ext:sh |
ext:bak |
ext:backup |
ext:swp |
ext:old |
ext:~ |
ext:git |
ext:svn |
ext:htpasswd |
ext:htaccess |
ext:json |
ext:daf
site:$WEBSITEBash
File Upload
Last updated