Skip to content

Commit

Permalink
Patch
Browse files Browse the repository at this point in the history
  • Loading branch information
Karmaz95 committed Oct 13, 2021
1 parent ef45068 commit 76241cd
Show file tree
Hide file tree
Showing 3 changed files with 9 additions and 3 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -149,6 +149,7 @@ crimson_exploit -D "example.domain.com" -d "collaborator.com" -i "ip"
# - Turn off interception
# - Make active scan for proxied urls only in scope
# 1. Start the script
# - If you didn't choose -a flag, go to /bounty/domain.tld/tested.domain.tld/temp and remove manually false positives entries in ferox.txt
# 2. Check the output listed above (LISTS)
# 3. Manually browse the application, click on all functionalities
# 4. Copy whole target scope from Burp after manually browsing the target
Expand Down
10 changes: 7 additions & 3 deletions crimson_exploit
Original file line number Diff line number Diff line change
Expand Up @@ -50,12 +50,16 @@ PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/go
### WORKFLOW
#
# 0. Start BURP - optional step
# - Create new project - www.example.tld
# - Turn off interception
# 1. Start vps listener and collaborator server
# 2. Start the script
# - You will be asked to remove false positives from exp/dirs.txt and exp/params.txt
# - Remove them and enter the "fg" + ENTER to continue
# 3. Check the output listed above (LISTS)
# 5. Look for [ID] [TIME] in oob.txt and compare it to pings on your vps / collaborator
# 8. Check deserialization pings with manual payloads
# 9. Start manual testing
# 4. Look for [ID] [TIME] in oob.txt and compare it to pings on your vps / collaborator
# 5. Check deserialization pings with manual payloads
# 6. Start manual testing
#
###

Expand Down
1 change: 1 addition & 0 deletions crimson_target
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,7 @@ PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/go
# - Turn off interception
# - Make active scan for proxied urls only in scope
# 1. Start the script
# - If you didn't choose -a flag, go to /bounty/tested.domain.tld/temp and remove manually false positives entries in ferox.txt
# 2. Check the output listed above (LISTS)
# 3. Manually browse the application, click on all functionalities
# 4. Copy whole target scope from Burp after manually browsing the target
Expand Down

0 comments on commit 76241cd

Please sign in to comment.