Posts

the Gf (Grep Framework).

 It’s a tool that uses pre-defined "patterns" to instantly find URLs that look like they have XSS , SQLi , or SSRF potential. 1. Install Gf and the "Secret Sauce" Patterns First, install the tool, then download the community patterns that tell it what to look for. Bash # Install Gf go install github.com/tomnomnom/gf@latest # Create the patterns folder mkdir -p ~/.gf # Download the best community patterns git clone https://github.com/1ndianl33t/Gf-Patterns cp Gf-Patterns/*.json ~/.gf 2. How to Filter Like a Pro Now you can take your massive list of endpoints ( all_endpoints.txt ) and "sift" them for specific bugs: Find XSS targets: cat all_endpoints.txt | gf xss Find SQL Injection targets: cat all_endpoints.txt | gf sqli Find SSRF (Server-Side Request Forgery): cat all_endpoints.txt | gf ssrf Find potential AWS/S3 leaks: cat all_endpoints.txt | gf s3-buckets 🚀 The "Hunting" Checklist: What to Look For When you look at your filtered resu...

Endpoint Discovery

  🚀 How to use them for Endpoint Discovery Now that you have the full toolkit, here is a "Pro" workflow to find endpoints for a target (e.g., example.com ): Step 1: Get the "History" (Passive) gau example.com --subs | tee urls_history.txt This grabs every old URL found in archives and saves it. Step 2: Crawl the "Now" (Active) katana -u https://example.com -d 5 -jc | tee urls_live.txt This crawls the site 5 levels deep ( -d 5 ) and looks inside JS files ( -jc ) for endpoints. Step 3: Clean & Sort cat urls_history.txt urls_live.txt | sort -u > all_endpoints.txt This combines both lists and removes duplicates, giving you a master list of endpoints. 💡 What are you looking for in these lists? Scan your all_endpoints.txt for "juicy" patterns like: /api/v1/... (API endpoints) ?debug=true or ?admin=1 (Hidden parameters) .php , .asp , .json (Specific file types) /config , /backup , /dev (Sensitive directories)

Full actionable workflow Hackerone program

  Full actionable workflow & checklist you can start on example.com RIGHT NOW (HackerOne-style public program). This is a complete “from zero to paid report” pipeline. I’ve classified everything by bug type (OWASP Top 10 2021 + the most common high-paying bug-bounty extras like IDOR, SSRF, Subdomain Takeover). For each bug you get: Why it pays (impact) Exact tests (tools + commands + why you run them) Quick-win order so you can hunt immediately Phase 0 – Preparation (10 minutes) Read the program policy on HackerOne (in-scope domains/subdomains). Create 2–3 test accounts (different roles if possible). Install free tools: Burp Suite Community (intercept everything — this is your #1 weapon because it lets you modify requests live without coding), Nuclei, ffuf, subfinder, httpx, waybackurls, gf (for patterns). Phase 1 – Recon & Attack Surface Mapping (start here — 1–2 hours) Subdomains: subfinder -d example.com -o subs.txt && httpx -l subs.txt -o live.t...

Routersploit Exploitation Framework

 **Routersploit** is an open-source exploitation framework specifically designed for **embedded devices** — especially routers, IoT gateways, cameras, and similar low-power network hardware. It's like a "Metasploit for routers": it helps you **discover**, **test**, and (in controlled/authorized scenarios) **exploit** known vulnerabilities in these devices. In your scenario (securing your own Tenda router, building skills to offer router cleanup/hardening services in Nairobi), Routersploit is one of the **best tools** because: - Many home/SOHO routers (Tenda, TP-Link, D-Link, Huawei, ZTE, etc.) have old firmware with public exploits. - It has **autopwn** — auto-tests hundreds of exploits quickly. - It includes scanners, credential testers, and generic exploits that catch common Tenda issues (command injection, path traversal, auth bypass, etc.), even if no exact "Tenda AC10" module exists. **Important ethical/legal reminder**   Use **only** on: - Your own router ...

Tenda-specific modules in core Metasploit Framework

Metasploit's official modules focus more on popular enterprise brands (Cisco, Netgear, D-Link, TP-Link, etc.) or generic web command injection patterns. Tenda routers — being budget/SOHO devices common in markets like Kenya — tend to have vulnerabilities disclosed via Exploit-DB, GitHub PoCs, or researcher blogs, but **very few make it into Rapid7's official Metasploit repo**. ### Current Status (March 2026) From recent searches and known sources: - **No official Metasploit modules** exist in the main framework for Tenda routers (no `exploit/linux/http/tenda_*` or similar when you run `search tenda` in msfconsole). - Older Tenda vulns (e.g., CVE-2018-5767 on AC15 RCE from 2018) have standalone Python exploits on Exploit-DB but were never ported to Metasploit. - Recent 2025–2026 Tenda CVEs (e.g., command injection CVE-2025-13207 on N300/4G03, buffer overflows CVE-2025-7795 on FH451, CVE-2025-29384 on AC9, CVE-2025-1851 on AC7) usually come with:   - Standalone Python/Ruby PoCs ...

Metasploit Router Exploitation Models

 Here are the most useful **Metasploit Framework** commands and workflows specifically for **router exploitation, auditing, and post-exploitation** in a white-hat context (your own router, lab setups like vulnerable VMs/firmware images, or authorized client routers). This builds on your Tenda router focus and intermediate level. Metasploit has **hundreds of router-related modules** (exploits, auxiliaries, scanners), especially for common brands like Cisco, D-Link, Netgear, TP-Link, Linksys, and some Tenda/Huawei/ZTE. Tenda-specific exploits are rare in core Metasploit (more often in Routersploit or standalone PoCs for recent CVEs like stack overflows/command injection), but many generic router HTTP/command injection modules apply. ### Step 1: Start Metasploit & Basic Navigation ```bash sudo msfconsole -q   # -q for quiet (no banner) ``` Inside msfconsole: - **Search for router modules** (best starting point):   ```bash   search router   search type:expl...

Kali Linux terminal commands on router security

Router Cleanup & Hardening All commands assume ethical use: **your own router/lab**, written permission for clients, or legal targets like scanme.nmap.org. Run as root (`sudo -i`) where needed. ### 1. Network Discovery & Device Mapping (Find the router + connected devices) - Basic live host discovery:   ```bash   sudo nmap -sn 192.168.0.0/24          # Replace with your subnet (Tenda often 192.168.0.0/24)   ``` - Detailed ARP scan (great for local WiFi networks):   ```bash   sudo arp-scan --localnet --interface=wlan0   # Or eth0 if wired   ``` - Find router specifically:   ```bash   ip route | grep default   # Shows gateway IP (your router)   arp -a | grep -i "router\|tenda"   # Look for Tenda MAC/vendor   ``` ### 2. Router-Specific Deep Scanning (Detect open ports, services, OS, vulns) - Aggressive scan with vuln scripts (your go-to for before/after hardening proof):   ...