File Extensions Handling

Check List

Methodology

Sensitive File Disclosure Via File Enumeration And Insecure File Upload

1

We open our browser and use the following command, which will find all sensitive files on the site, by entering the URL plus the target domain name

2

And then we can use the following commands to check for the presence of sensitive files such as XLS, PDF, CONF, etc. on the target

3

Using the following commands, we will check for file Uploader and scan different file types on the site using its own tool

4

We can create and run a script that does all this without errors, and if there is a sensitive file in the target, the vulnerability will be identified


Cheat Sheet

Forced Browsing

Extensions

ext:log | 
ext:txt | 
ext:conf | 
ext:cnf | 
ext:ini | 
ext:env | 
ext:sh | 
ext:bak | 
ext:backup | 
ext:swp | 
ext:old | 
ext:~ | 
ext:git | 
ext:svn | 
ext:htpasswd | 
ext:htaccess | 
ext:json | 
ext:daf 
site:$WEBSITE

OR

File Types

Scan all

File Types

Bash

Scan phpinfo.php

Create Script

Run Script

File Upload

Fuzz Uploader

Fuzz Extension & Content-Type

Create Script

Run Script

Last updated