Skip to main content

Testing Node JS and MongoDB - a dummy guide

Web application is a most widely used nowadays. Well, it depends on what platform that you wanted to use for. From Java, PHP, ASP, ColdFusion etc.  Also databases like MySQL, MSSQL Oracle, DB2, Informix etc.

All these so call platform have many vulnerability which evolved day-to-day. Patching and update is a must and become important for us keep track on any issues or risk and vulnerabilities within the application.

As for now, JS Framework e.g Node JS with MongoDB has become popular in web application deployment.

So, I been thinking hacking into these framework or platform is kind a new to me. Most people said that Node JS and MongoDB are invulnerable to SQL Injection and many other common vulnerability. Apart for that I been doing some research on this on how to hack or exploiting this.

I been reading this guide by Petko @pdp




A video presented at BlackHat USA 2015 by Maty Siman  &  Amit Ashbel

For mongoDB best practices and reading guide.

Using Metasploit:

use auxiliary/scanner/mongodb/mongodb_login

To concluded, fuzzing JSON and the like is tough but I love it.

Comments

Popular posts from this blog

List of SQLMAP Tamper Scripts

Just re-post one of my visited reference blog post: Original URL: http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html Name Description Example apostrophemask.py Replaces apostrophe character with its UTF-8 full width counterpart '1 AND %EF%BC%871%EF%BC%87=%EF%BC%871' apostrophenullencode.py Replaces apostrophe character with its illegal double unicode counterpart '1 AND %271%27=%271' appendnullbyte.py Appends encoded NULL byte character at the end of payload '1 AND 1=1' base64encode.py Base64 all characters in a given payload 'MScgQU5EIFNMRUVQKDUpIw==' between.py Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' '1 AND A NOT BETWEEN 0 AND B--' bluecoat.py Replaces space character after SQL statement with a valid random blank character.Afterwards replace character = with LIKE operator 'SELECT%09id FROM users where id LIKE 1' chardoubleencode.py Double url-encodes all character

Create a session & restore abort/interrupted session in John The Ripper!

Been busy with report writing. Just wanna put some of these command and technique on how to restore interrupted session or aborted session in John The Ripper. 1. First step crack the hash with these commands : john --session=test --format=raw-sha --incremental=rockyou test.txt 2. To restore the abort /interrupted session that you wanted to resume just run these commands : john --restore=test Check the "test.log" Note:  Make sure that these file are not delete " .rec " and " .log " files if the file is deleted or missing it wont work. That's all happy cracking!

iOS - Convert .app to .ipa

While doing a iOS Security Testing, I wondered how do we convert .app into .ipa. So basically here are the structure of .ipa files. 1. First, SSH in your iPhone (Jailbroken). 2. Download the .app folder via scp  3. Copy the .app folder into a folder called Payload. 4. Compress it with .zip extension using any compression software. 5. Change the extension from file.zip to file.ipa. That’s it. Now you can use these .ipa files to install the app into your iPhone.