Posts

Showing posts from March, 2026

the Gf (Grep Framework).

 It’s a tool that uses pre-defined "patterns" to instantly find URLs that look like they have XSS , SQLi , or SSRF potential. 1. Install Gf and the "Secret Sauce" Patterns First, install the tool, then download the community patterns that tell it what to look for. Bash # Install Gf go install github.com/tomnomnom/gf@latest # Create the patterns folder mkdir -p ~/.gf # Download the best community patterns git clone https://github.com/1ndianl33t/Gf-Patterns cp Gf-Patterns/*.json ~/.gf 2. How to Filter Like a Pro Now you can take your massive list of endpoints ( all_endpoints.txt ) and "sift" them for specific bugs: Find XSS targets: cat all_endpoints.txt | gf xss Find SQL Injection targets: cat all_endpoints.txt | gf sqli Find SSRF (Server-Side Request Forgery): cat all_endpoints.txt | gf ssrf Find potential AWS/S3 leaks: cat all_endpoints.txt | gf s3-buckets 🚀 The "Hunting" Checklist: What to Look For When you look at your filtered resu...

Endpoint Discovery

  🚀 How to use them for Endpoint Discovery Now that you have the full toolkit, here is a "Pro" workflow to find endpoints for a target (e.g., example.com ): Step 1: Get the "History" (Passive) gau example.com --subs | tee urls_history.txt This grabs every old URL found in archives and saves it. Step 2: Crawl the "Now" (Active) katana -u https://example.com -d 5 -jc | tee urls_live.txt This crawls the site 5 levels deep ( -d 5 ) and looks inside JS files ( -jc ) for endpoints. Step 3: Clean & Sort cat urls_history.txt urls_live.txt | sort -u > all_endpoints.txt This combines both lists and removes duplicates, giving you a master list of endpoints. 💡 What are you looking for in these lists? Scan your all_endpoints.txt for "juicy" patterns like: /api/v1/... (API endpoints) ?debug=true or ?admin=1 (Hidden parameters) .php , .asp , .json (Specific file types) /config , /backup , /dev (Sensitive directories)

Full actionable workflow Hackerone program

  Full actionable workflow & checklist you can start on example.com RIGHT NOW (HackerOne-style public program). This is a complete “from zero to paid report” pipeline. I’ve classified everything by bug type (OWASP Top 10 2021 + the most common high-paying bug-bounty extras like IDOR, SSRF, Subdomain Takeover). For each bug you get: Why it pays (impact) Exact tests (tools + commands + why you run them) Quick-win order so you can hunt immediately Phase 0 – Preparation (10 minutes) Read the program policy on HackerOne (in-scope domains/subdomains). Create 2–3 test accounts (different roles if possible). Install free tools: Burp Suite Community (intercept everything — this is your #1 weapon because it lets you modify requests live without coding), Nuclei, ffuf, subfinder, httpx, waybackurls, gf (for patterns). Phase 1 – Recon & Attack Surface Mapping (start here — 1–2 hours) Subdomains: subfinder -d example.com -o subs.txt && httpx -l subs.txt -o live.t...

Routersploit Exploitation Framework

 **Routersploit** is an open-source exploitation framework specifically designed for **embedded devices** — especially routers, IoT gateways, cameras, and similar low-power network hardware. It's like a "Metasploit for routers": it helps you **discover**, **test**, and (in controlled/authorized scenarios) **exploit** known vulnerabilities in these devices. In your scenario (securing your own Tenda router, building skills to offer router cleanup/hardening services in Nairobi), Routersploit is one of the **best tools** because: - Many home/SOHO routers (Tenda, TP-Link, D-Link, Huawei, ZTE, etc.) have old firmware with public exploits. - It has **autopwn** — auto-tests hundreds of exploits quickly. - It includes scanners, credential testers, and generic exploits that catch common Tenda issues (command injection, path traversal, auth bypass, etc.), even if no exact "Tenda AC10" module exists. **Important ethical/legal reminder**   Use **only** on: - Your own router ...

Tenda-specific modules in core Metasploit Framework

Metasploit's official modules focus more on popular enterprise brands (Cisco, Netgear, D-Link, TP-Link, etc.) or generic web command injection patterns. Tenda routers — being budget/SOHO devices common in markets like Kenya — tend to have vulnerabilities disclosed via Exploit-DB, GitHub PoCs, or researcher blogs, but **very few make it into Rapid7's official Metasploit repo**. ### Current Status (March 2026) From recent searches and known sources: - **No official Metasploit modules** exist in the main framework for Tenda routers (no `exploit/linux/http/tenda_*` or similar when you run `search tenda` in msfconsole). - Older Tenda vulns (e.g., CVE-2018-5767 on AC15 RCE from 2018) have standalone Python exploits on Exploit-DB but were never ported to Metasploit. - Recent 2025–2026 Tenda CVEs (e.g., command injection CVE-2025-13207 on N300/4G03, buffer overflows CVE-2025-7795 on FH451, CVE-2025-29384 on AC9, CVE-2025-1851 on AC7) usually come with:   - Standalone Python/Ruby PoCs ...

Metasploit Router Exploitation Models

 Here are the most useful **Metasploit Framework** commands and workflows specifically for **router exploitation, auditing, and post-exploitation** in a white-hat context (your own router, lab setups like vulnerable VMs/firmware images, or authorized client routers). This builds on your Tenda router focus and intermediate level. Metasploit has **hundreds of router-related modules** (exploits, auxiliaries, scanners), especially for common brands like Cisco, D-Link, Netgear, TP-Link, Linksys, and some Tenda/Huawei/ZTE. Tenda-specific exploits are rare in core Metasploit (more often in Routersploit or standalone PoCs for recent CVEs like stack overflows/command injection), but many generic router HTTP/command injection modules apply. ### Step 1: Start Metasploit & Basic Navigation ```bash sudo msfconsole -q   # -q for quiet (no banner) ``` Inside msfconsole: - **Search for router modules** (best starting point):   ```bash   search router   search type:expl...

Kali Linux terminal commands on router security

Router Cleanup & Hardening All commands assume ethical use: **your own router/lab**, written permission for clients, or legal targets like scanme.nmap.org. Run as root (`sudo -i`) where needed. ### 1. Network Discovery & Device Mapping (Find the router + connected devices) - Basic live host discovery:   ```bash   sudo nmap -sn 192.168.0.0/24          # Replace with your subnet (Tenda often 192.168.0.0/24)   ``` - Detailed ARP scan (great for local WiFi networks):   ```bash   sudo arp-scan --localnet --interface=wlan0   # Or eth0 if wired   ``` - Find router specifically:   ```bash   ip route | grep default   # Shows gateway IP (your router)   arp -a | grep -i "router\|tenda"   # Look for Tenda MAC/vendor   ``` ### 2. Router-Specific Deep Scanning (Detect open ports, services, OS, vulns) - Aggressive scan with vuln scripts (your go-to for before/after hardening proof):   ...

Turn Kali skills into a real business

 **Yes — this is exactly how pros .**   You're already intermediate, so we're skipping baby steps. Below is the **exact professional workflow** I (and many Kenyan freelancers) use for paid “Router Security Cleanup” gigs: detect malware (Mirai/botnets), exploits, payloads, weak WiFi, then harden and prove it. Clients love it because you show them the attack live, then fix it in 30–45 mins and charge KSh 3,000–7,000 per router (or KSh 15k+ for whole home/office). **Legal & Ethics First (non-negotiable for services)**   - Get **written permission** (simple WhatsApp/Email: “I authorise you to test and secure my router”).   - Never run on neighbours or public networks.   - Start every job with a backup of the router config.   - In Kenya, common targets: TP-Link Archer, Huawei HG series, ZTE, Safaricom-branded routers — all vulnerable to Mirai-style telnet exploits in 2026. sudo apt update && sudo apt install -y nmap nuclei ai...