You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> This repository and its tools are provided "as is" without warranty of any kind, either express or implied, including but not limited to, any warranties of merchantability, fitness for a particular purpose, and non-infringement. The authors shall not be liable for any claims, damages, or other liabilities arising from, out of, or in connection with the use of this tool. The user is solely responsible for ensuring their use of this tool complies with all applicable laws and regulations. The authors disclaim any liability for illegal or unethical use.
14
13
15
-
16
14
## 🎱 Attack Surface
17
15
18
16
```mermaid
@@ -32,6 +30,7 @@ flowchart TD
32
30
F --> M(*Sensitive Data*)
33
31
G --> O(*Serialized Data*)
34
32
G --> R(*Business Logic*)
33
+
G --> U(*Updates*)
35
34
H --> P(*Variables and functions*)
36
35
```
37
36
@@ -49,7 +48,6 @@ flowchart TD
49
48
|**Log Management**| V19 Logging and Monitoring |
50
49
|**Service Behavior**| V14 API and Web Service Security, V17 Business Logic |
51
50
52
-
53
51
## 🐞 Vulnerabilities
54
52
55
53
| MITRE Reference | Description | Difficulty |
@@ -84,23 +82,19 @@ flowchart TD
84
82
| CWE-918 | Server-Side Request Forgery | Medium |
85
83
| CWE-1270 | Generation of Incorrect Security Tokens | Medium |
86
84
87
-
88
-
89
85
## 🔑 Hint & Write Up
90
86
91
87
* Try reading [Dojo-101](https://github.com/Aif4thah/Dojo-101), this project contains all you need to hack this app.
92
88
93
89
*[Become a sponsor](https://github.com/sponsors/Aif4thah) and get access to the **full methodology** and **complete write-up**.
0 commit comments