Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
/ WSAAR Public

Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.

Notifications You must be signed in to change notification settings

Nishacid/WSAAR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

13 Commits

Repository files navigation

Web Security Academy Auto-Recon (WSAAR)

Auto-Recon script that will help you in the Burp Suite Certified Practitioner Exam or with any web-security lab.

Wordlists provided in wordlists directory are these provided by Web Security Academy here :

📖 A bit of story

I created this tool for personal use, at the beginning of the certification when it was still only 3 hours for 6 challenges, because I was very short of time and I needed a tool that would make me recognize the labs to go faster. In no way my goal was to make a tool that was going to make me do labs automatically, that's why there is no payload in this script, it's only to save time on the reconnaissance related to labs.

I know, the code of this script is not perfect, as I said before I had made this script quickly as my own, I publish this code hoping to give a starting point to someone to make maybe something cleaner or to have a little tool to help with the reconnaissance. If you want to improve it, don't hesitate to contribute

If you want to know more about this certification and the process, I wrote an article here: https://nishacid.guru/articles/bscp/ .

🛠️ Installation

git clone https://github.com/Nishacid/WSAAR.git
cd WSAAR/
pip3 install -r requirements.txt

✔️ Usage

» python3 wsaar.py -h
usage: wsaar.py [-h] --id HOST [--username USERNAME] [--password PASSWORD]
options:
 -h, --help show this help message and exit
 --id HOST, -i HOST Your Lab ID
 --username USERNAME, -u USERNAME
 Username to login
 --password PASSWORD, -p PASSWORD
 Password to login

🔎 Some Examples

Example with Cross-Origin Ressource Sharing

» python3 wsaar.py --id 0ae7004d0475e2aec3077ab10088008a
 _ __ _____ ___ ___ _____
 | | / / / ___/ / | / | | _ \
 | | __ / / | |___ / /| | / /| | | |_| |
 | | / | / / \___ \  / / | | / / | | | _ /
 | |/ |/ / ___| | / / | | / / | | | | \ \
 |___/|___/ /_____/ /_/ |_| /_/ |_| |_| \_\
 Web Security Academy Auto Recon
 @Nishacid
[*] General Check...
[+] Restricted Admin Panel found on /admin
[+] Exploit server avaliable on https://exploit-0a4200ad04abe23ac34279b001030015.exploit-server.net
[*] Login Check...
[+] There is a login page on /login
[*] CSRF Token required for login
[+] Successful login with default wiener:peter account
[*] Cookies are : {'session': 'bXjUemxcNF3x5IWpsYNNIUl4Jw9QNn50'}
[*] Account Informations
[+] Account Details found on /accountDetails
{
 "apikey": "heuXirXWmZi5EJsb7lu1RISDYgog19pP",
 "email": "",
 "sessions": [
 "bXjUemxcNF3x5IWpsYNNIUl4Jw9QNn50"
 ],
 "username": "wiener"
}
[+] Highly possible CORS due to Access-Control-Allow-Credentials Header in response
[*] Deserialization Check...
[*] CORS Check...
[*] Access Control Check...
[*] OAuth Check...
[*] LFI Check...
[*] File Upload Check...
[*] Business Logic Check...
[*] Information Disclosure Check...
[*] SQL Injection Check...
[*] SSRF Check...
[*] XXE Check...
[*] Web Cache Poisoning Check...
[*] XSS Check...
[*] HTTP Request Smuggling Check...
[*] WebSockets Check...
[*] Prototype Pollution Check...
Execution completed, good luck for the next steps :)

Example with Web Cache Poisoning

» python3 wsaar.py --id 0afd00d5042b2017c02da98d00c3004a
 _ __ _____ ___ ___ _____
 | | / / / ___/ / | / | | _ \
 | | __ / / | |___ / /| | / /| | | |_| |
 | | / | / / \___ \  / / | | / / | | | _ /
 | |/ |/ / ___| | / / | | / / | | | | \ \
 |___/|___/ /_____/ /_/ |_| /_/ |_| |_| \_\
 Web Security Academy Auto Recon
 @Nishacid
[*] General Check...
[+] Exploit server avaliable on https://exploit-0a620032040d20a9c0cca8ac01b600d4.exploit-server.net
[*] Login Check...
[+] There is a login page on /login
[*] CSRF Token required for login
[-] Default login doesn't work
[*] You can try to Bruteforce with the username and password provided in the ./wordlists/ folder

[*] Deserialization Check...

[*] CORS Check...

[*] Access Control Check...

[*] OAuth Check...

[*] LFI Check...

[*] File Upload Check...

[*] Business Logic Check...

[*] Information Disclosure Check...

[*] SQL Injection Check...

[*] SSRF Check...

[*] XXE Check...

[*] Web Cache Poisoning Check...
[+] Highly possible Web Cache Poisoning due to X-Cache Header in response
[+] Highly possible Web Cache Poisoning due to Cache-Control Header in response
[+] Possible Web Cache Poisoning due to script on /resources/js/tracking.js

[*] XSS Check...

[*] HTTP Request Smuggling Check...

[*] WebSockets Check...

[*] Prototype Pollution Check...

Execution completed, good luck for the next steps :)

Example with custom creds

» python3 wsaar.py --id 0a42002c03fc3bdfc08c59b700f60004 --username atlas --password 131313
 _ __ _____ ___ ___ _____
 | | / / / ___/ / | / | | _ \
 | | __ / / | |___ / /| | / /| | | |_| |
 | | / | / / \___ \  / / | | / / | | | _ /
 | |/ |/ / ___| | / / | | / / | | | | \ \
 |___/|___/ /_____/ /_/ |_| /_/ |_| |_| \_\
 Web Security Academy Auto Recon
 @Nishacid
[*] General Check...
[+] Leave a comment to a post functionality
[*] Login Check...
[+] There is a login page on /login
[+] Successful login with custom atlas:131313 account
[*] Cookies are : {'session': 'ejGFm9t9oqcLVzWaIBkOuGRbxn6JNNE8'}
[*] Account Informations
[*] Deserialization Check...
[*] CORS Check...
[*] Access Control Check...
[*] OAuth Check...
[*] LFI Check...
[*] File Upload Check...
[*] Business Logic Check...
[*] Information Disclosure Check...
[*] SQL Injection Check...
[*] SSRF Check...
[*] XXE Check...
[*] Web Cache Poisoning Check...
[*] XSS Check...
[*] HTTP Request Smuggling Check...
[*] WebSockets Check...
[*] Prototype Pollution Check...
Execution completed, good luck for the next steps :)

📝Todo list idea

  • Add header argument to pass some cookies / HTTP headers
  • Code cleaning
  • Improve login.py script (dirty)
  • Add news labs / and missing vulnerabilities
  • Add carlos:montoya login check

❤️ Contributing

Pull requests are welcome. Feel free to contribute to complete these scripts or to make improvements.

You can contact me on Twitter @Nishacid or email nishacid@protonmail.com.

About

Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

Languages

AltStyle によって変換されたページ (->オリジナル) /