Skip to content

Commit 4e950ae

Browse files
carlospolopgitbook-bot
authored andcommitted
GitBook: [master] 7 pages and 10 assets modified
1 parent 4910c92 commit 4e950ae

File tree

12 files changed

+36
-29
lines changed

12 files changed

+36
-29
lines changed

SUMMARY.md

+1
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,7 @@
217217
* [69/UDP TFTP/Bittorrent-tracker](pentesting/69-udp-tftp.md)
218218
* [79 - Pentesting Finger](pentesting/pentesting-finger.md)
219219
* [80,443 - Pentesting Web Methodology](pentesting/pentesting-web/README.md)
220+
* [AEM - Adobe Experience Cloud](pentesting/pentesting-web/aem-adobe-experience-cloud.md)
220221
* [Apache](pentesting/pentesting-web/apache.md)
221222
* [Artifactory Hacking guide](pentesting/pentesting-web/artifactory-hacking-guide.md)
222223
* [Buckets](pentesting/pentesting-web/buckets/README.md)

forensics/basic-forensic-methodology/windows-forensics/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The files in the folder WPDNSE are a copy of the original ones, then won't survi
130130

131131
Check the file `C:\Windows\inf\setupapi.dev.log` to get the timestamps about when the USB connection was produced \(search for `Section start`\).
132132

133-
![](../../../.gitbook/assets/image%20%28477%29%20%282%29%20%282%29%20%282%29%20%282%29%20%282%29%20%281%29.png)
133+
![](../../../.gitbook/assets/image%20%28477%29%20%282%29%20%282%29%20%282%29%20%282%29%20%282%29%20%282%29%20%281%29.png)
134134

135135
### USB Detective
136136

mobile-apps-pentesting/ios-pentesting/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -601,7 +601,7 @@ Many apps log informative \(and potentially sensitive\) messages to the console
601601
5. Reproduce the problem.
602602
6. Click on the **Open Console** button located in the upper right-hand area of the Devices window to view the console logs on a separate window.
603603
604-
![](../../.gitbook/assets/image%20%28466%29%20%282%29%20%282%29%20%282%29%20%282%29%20%282%29%20%281%29.png)
604+
![](../../.gitbook/assets/image%20%28466%29%20%282%29%20%282%29%20%282%29%20%282%29%20%282%29%20%282%29%20%281%29.png)
605605
606606
You can also connect to the device shell as explained in Accessing the Device Shell, install **socat** via **apt-get** and run the following command:
607607

online-platforms-with-api.md

+27-26
Original file line numberDiff line numberDiff line change
@@ -1,114 +1,114 @@
11
# Online Platforms with API
22

3-
### [ProjectHoneypot](https://www.projecthoneypot.org/)
3+
## [ProjectHoneypot](https://www.projecthoneypot.org/)
44

55
You can ask if an IP is related to suspicious/malicious activities. Completely free.
66

7-
### \*\*\*\*[**BotScout**](http://botscout.com/api.htm)\*\*\*\*
7+
## \*\*\*\*[**BotScout**](http://botscout.com/api.htm)\*\*\*\*
88

99
Check if the IP address is related to a bot that register accounts. It can also check usernames and emails. Initially free.
1010

11-
### [Hunter](https://hunter.io/)
11+
## [Hunter](https://hunter.io/)
1212

1313
Find and verify emails.
1414
Some free API requests free, for more you need to pay.
1515
Commercial?
1616

17-
### [AlientVault](https://otx.alienvault.com/api)
17+
## [AlientVault](https://otx.alienvault.com/api)
1818

1919
Find Malicious activities related to IPs and Domains. Free.
2020

21-
### [Clearbit](https://dashboard.clearbit.com/)
21+
## [Clearbit](https://dashboard.clearbit.com/)
2222

2323
Find related personal data to a email \(profiles on other platforms\), domain \(basic company info ,mails and people working\) and companies \(get company info from mail\).
2424
You need to pay to access all the possibilities.
2525
Commercial?
2626

27-
### [BuiltWith](https://builtwith.com/)
27+
## [BuiltWith](https://builtwith.com/)
2828

2929
Technologies used by webs. Expensive...
3030
Commercial?
3131

32-
### [Fraudguard](https://fraudguard.io/)
32+
## [Fraudguard](https://fraudguard.io/)
3333

3434
Check if a host \(domain or IP\) is related with suspicious/malicious activities. Have some free API access.
3535
Commercial?
3636

37-
### [FortiGuard](https://fortiguard.com/)
37+
## [FortiGuard](https://fortiguard.com/)
3838

3939
Check if a host \(domain or IP\) is related with suspicious/malicious activities. Have some free API access.
4040

41-
### [SpamCop](https://www.spamcop.net/)
41+
## [SpamCop](https://www.spamcop.net/)
4242

4343
Indicates if host is related to spam activity. Have some free API access.
4444

45-
### [mywot](https://www.mywot.com/)
45+
## [mywot](https://www.mywot.com/)
4646

4747
Based on opinions and other metrics get if a domain is related with suspicious/malicious information.
4848

49-
### [ipinfo](https://ipinfo.io/)
49+
## [ipinfo](https://ipinfo.io/)
5050

5151
Obtains basic info from an IP address. You can test up to 100K/month.
5252

53-
### [securitytrails](https://securitytrails.com/app/account)
53+
## [securitytrails](https://securitytrails.com/app/account)
5454

5555
This platform give information about domains and IP addresses like domains inside an IP or inside a domain server, domains owned by an email \(find related domains\), IP history of domains \(find the host behind CloudFlare\), all domains using a nameserver....
5656
You have some free access.
5757

58-
### [fullcontact](https://www.fullcontact.com/)
58+
## [fullcontact](https://www.fullcontact.com/)
5959

6060
Allows to search by email, domain or company name and retrieve "personal" information related. It can also verify emails. There is some free access.
6161

62-
### [RiskIQ](https://www.spiderfoot.net/documentation/)
62+
## [RiskIQ](https://www.spiderfoot.net/documentation/)
6363

6464
A lot of information from domains and IPs even in the free/community version.
6565

66-
### [\_IntelligenceX](https://intelx.io/)
66+
## [\_IntelligenceX](https://intelx.io/)
6767

6868
Search Domains, IPs and emails and get info from dumps. Have some free access.
6969

70-
### [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/)
70+
## [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/)
7171

7272
Search by IP and gather information related to suspicions activities. There is some free access.
7373

74-
### [Greynoise](https://viz.greynoise.io/)
74+
## [Greynoise](https://viz.greynoise.io/)
7575

7676
Search by IP or IP range and get information about IPs scanning the Internet. 15 days free access.
7777

78-
### [Shodan](https://www.shodan.io/)
78+
## [Shodan](https://www.shodan.io/)
7979

8080
Get scan information of an IP address. Have some free api access.
8181

82-
### [Censys](https://censys.io/)
82+
## [Censys](https://censys.io/)
8383

8484
Very similar to shodan
8585

86-
### [buckets.grayhatwarfare.com](https://buckets.grayhatwarfare.com/)
86+
## [buckets.grayhatwarfare.com](https://buckets.grayhatwarfare.com/)
8787

8888
Find open S3 buckets searching by keyword.
8989

90-
### [Dehashed](https://www.dehashed.com/data)
90+
## [Dehashed](https://www.dehashed.com/data)
9191

9292
Find leaked credentials of emails and even domains
9393
Commercial?
9494

95-
### [psbdmp](https://psbdmp.ws/)
95+
## [psbdmp](https://psbdmp.ws/)
9696

9797
Search pastebins where a email appeared. Commercial?
9898

99-
### [emailrep.io](https://emailrep.io/key)
99+
## [emailrep.io](https://emailrep.io/key)
100100

101101
Get reputation of a mail. Commercial?
102102

103-
### [ghostproject](https://ghostproject.fr/)
103+
## [ghostproject](https://ghostproject.fr/)
104104

105105
Get passwords from leaked emails. Commercial?
106106

107-
### [Binaryedge](https://www.binaryedge.io/)
107+
## [Binaryedge](https://www.binaryedge.io/)
108108

109109
Obtain interesting info from IPs
110110

111-
### [haveibeenpwned](https://haveibeenpwned.com/)
111+
## [haveibeenpwned](https://haveibeenpwned.com/)
112112

113113
Search by domain and email and get if it was pwned and passwords. Commercial?
114114

@@ -117,3 +117,4 @@ Search by domain and email and get if it was pwned and passwords. Commercial?
117117
[https://www.netcraft.com/](https://www.netcraft.com/) \(in a commercial tool?\)
118118

119119
[https:/https://www.nmmapper.com/sys/tools/subdomainfinder/](https://www.nmmapper.com/) \(in a commercial tool?\)
120+

pentesting-web/saml-attacks/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
## Attacks Graphic
88

9-
![](../../.gitbook/assets/image%20%28535%29%20%281%29%20%281%29.png)
9+
![](../../.gitbook/assets/image%20%28535%29%20%281%29%20%281%29%20%281%29.png)
1010

1111
## Tool
1212

pentesting/pentesting-web/README.md

+1
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ Search **for** [**vulnerabilities of the web application** **version**](../../se
6969

7070
Some **tricks** for **finding vulnerabilities** in different well known **technologies** being used:
7171

72+
* \*\*\*\*[**AEM - Adobe Experience Cloud**](aem-adobe-experience-cloud.md)\*\*\*\*
7273
* \*\*\*\*[**Apache**](apache.md)\*\*\*\*
7374
* \*\*\*\*[**Artifactory**](artifactory-hacking-guide.md)\*\*\*\*
7475
* \*\*\*\*[**Buckets**](buckets/)\*\*\*\*
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# AEM - Adobe Experience Cloud
2+
3+
Find vulnerabilities and missconfigurations with [https://github.com/0ang3el/aem-hacker](https://github.com/0ang3el/aem-hacker)
4+

0 commit comments

Comments
 (0)