diff --git a/Dockerfile b/Dockerfile index 2014659..3ea9aa0 100644 --- a/Dockerfile +++ b/Dockerfile @@ -17,6 +17,7 @@ RUN apt-get install -y \ php-cgi \ php-cli \ php-common \ + php-gd \ php-curl \ php-dev \ php-json \ diff --git a/README.md b/README.md index f5e8849..864c52a 100644 --- a/README.md +++ b/README.md @@ -30,6 +30,7 @@ * Broken Authentication * Race Condition * Server Side Template Injection (SSTI) +* API Hacking ## Installation diff --git a/app/lab/api-hacking/API-HACKING2/allcontent.php b/app/lab/api-hacking/API-HACKING2/allcontent.php new file mode 100644 index 0000000..9a415d7 --- /dev/null +++ b/app/lab/api-hacking/API-HACKING2/allcontent.php @@ -0,0 +1,36 @@ +query($sql); +$contents = $stmt->fetchAll(PDO::FETCH_ASSOC); +?> + + +
+| # | ++ |
|---|---|
| = $index + 1 ?> | += htmlspecialchars($comment['comment']) ?> | +
" . $strings['oldamount'] . "{$_SESSION['old_total']} ". $strings['unit']."
"; } - // Toplam tutarı hesapla ve göster + // Calculate and display the total amount $total = array_sum(array_filter($_SESSION['cart'], 'is_numeric')); echo "". $strings['total'] . "$total " . $strings['unit'] . "
"; ?> - + diff --git a/app/lab/xss/basic-stored/database.db b/app/lab/xss/basic-stored/database.db index 85591c4..f0b8678 100644 Binary files a/app/lab/xss/basic-stored/database.db and b/app/lab/xss/basic-stored/database.db differ diff --git a/app/lab/xss/news/hackernews.db b/app/lab/xss/news/hackernews.db index eefdf80..5ef464f 100644 Binary files a/app/lab/xss/news/hackernews.db and b/app/lab/xss/news/hackernews.db differ diff --git a/app/main.json b/app/main.json index 5fc1b91..b55f343 100644 --- a/app/main.json +++ b/app/main.json @@ -1035,5 +1035,121 @@ } ] + }, + { + "id": 13, + "title": { + "en": "API Hacking", + "tr": "API Saldırısı", +<<<<<<< HEAD + "fr": "Violation de l'API", + "ar": "" + }, + "description": { + "en": "API hacking is a type of attack where malicious individuals or hackers attempt to gain unauthorized access to applications or systems through an API.", + "tr": "API saldırısı, kötü niyetli kişilerin veya hacker'ların, bir API üzerinden uygulama veya sistemlere yetkisiz erişim elde etmeye çalıştığı bir saldırı türüdür.", + "fr": "L'API hacking est un type d'attaque où des individus malveillants ou des pirates informatiques tentent d'obtenir un accès non autorisé à des applications ou des systèmes via une API.", +======= + "fr": "API Hacking", + "ar": "" + }, + "description": { + "en": "API hacking is the act of exploiting vulnerabilities in an application or web deployment API by using it for malicious purposes. Such attacks can result in unauthorized access, leaking data at sensitive intervals, or denial of service.", + "tr": "API hacking, bir uygulamanın veya web sitesinin API'sini kötü niyetli amaçlarla kullanarak güvenlik açıklarını sömürme eylemidir. Bu tür saldırılar, yetkisiz erişim elde etmek, hassas verilere erişmek, veri sızdırmak veya hizmeti engellemek gibi sonuçlar doğurabilir.", + "fr": "Le piratage d'API consiste à exploiter les vulnérabilités d'une application ou d'une API de déploiement Web en l'utilisant à des fins malveillantes. De telles attaques peuvent entraîner un accès non autorisé, une fuite de données à des intervalles sensibles ou un déni de service.", +>>>>>>> bab6308f19302d31407a97fe2766786a6ea75ec8 + "ar": "" + }, + "imgURL": "public/assets/img/vulns/api.png", + "labs": [ + { + "id": 1, + "title": { +<<<<<<< HEAD + "en": "API Documentation", + "tr": "API Belgeleri", + "fr": "Documentation de l'API", + "ar": "" + }, + "description": { + "en": "Using the ID of the admin user, delete the \"delete_me.jpg\" file.", + "tr": "Admin kullanıcısının id bilgisini kullanarak \"delete_me.jpg\" dosyasını siliniz.", + "fr": "Supprimez le fichier \"delete_me.jpg\" en utilisant l'identifiant de l'utilisateur administrateur.", + "ar": "" + }, + "url": "/lab/api-hacking/api-hacking1/", + "vulnID": 13 + }, + { + "id": 2, + "title": { + "en": "API Hacking with IDOR 2", + "tr": "IDOR ile API Hacking 2", + "fr": "Piratage d'API avec IDOR 2", + "ar": "" + }, + "description": { + "en": "Manipulate the API to modify articles of different users.", + "tr": "API'yi manipüle ederek farklı kullanıcıların makalelerini değiştiriniz.", + "fr": "Manipulez l'API pour modifier les articles d'autres utilisateurs.", + "ar": "" + }, + "url": "/lab/api-hacking/API-HACKING2/", + "vulnID": 13 + } + ] + }, + { + "id": 14, + "title": { + "en": "Captcha Bypass", + "tr": "Captcha Bypass", + "fr": "Captcha Bypass", + "ar": "" + }, + "description": { + "en": "CAPTCHA bypass methods are techniques developed to circumvent security measures on websites. These methods typically aim to exploit computer programming and artificial intelligence techniques to allow non-human automated bots to solve or bypass CAPTCHA challenges. This facilitates activities such as spam submissions, account creation bots, and other automated malicious activities. However, such methods are considered unethical and illegal, and are constantly monitored by website owners for detection and mitigation.", + "tr": "CAPTCHA bypass, web sitelerindeki güvenlik önlemlerini aşmak amacıyla geliştirilen yöntemlerdir. Bu yöntemler, genellikle bilgisayar programlama ve yapay zeka tekniklerinin karmaşık kombinasyonlarını kullanarak, insan olmayan otomatik botların CAPTCHA'yı çözmesini veya geçmesini sağlar. Bu sayede, spam gönderimleri, hesap oluşturma botları ve diğer otomatik kötü niyetli faaliyetlerin gerçekleştirilmesi amaçlanır. Ancak, bu tür yöntemler etik dışı ve yasa dışı kabul edilir ve web sitesi sahipleri tarafından tespit edilerek önlem alınması için sürekli olarak izlenirler.", + "fr": "Les méthodes de contournement de CAPTCHA sont des techniques développées pour contourner les mesures de sécurité sur les sites Web. Ces méthodes visent généralement à exploiter la programmation informatique et les techniques d'intelligence artificielle pour permettre aux robots automatisés non humains de résoudre ou de contourner les défis CAPTCHA. Cela facilite des activités telles que les soumissions de spam, les robots de création de compte et d'autres activités malveillantes automatisées. Cependant, de telles méthodes sont considérées comme contraires à l'éthique et illégales, et sont constamment surveillées par les propriétaires de sites Web pour la détection et l'atténuation.", + "ar": "" + }, + "imgURL": "public/assets/img/vulns/captcha.png", + "labs": [ + { + "id": 1, + "title": { + "en": "Captcha Bypass", + "tr": "Captcha Bypass", + "fr": "Captcha Bypass", + "ar": "" + }, + "description": { + "en": "Get rid of CAPTCHA with the help of ROBOTS! Remember, CAPTCHA is constantly being refreshed.", + "tr": "ROBOTlardan yardım alarak Captchadan kurtulun! Unutmayın, captcha sürekli yenileniyor:)", + "fr": "Débarrassez-vous de CAPTCHA avec l'aide des ROBOTS! N'oubliez pas, CAPTCHA est constamment rafraîchi.", + "ar": "" + }, + "url": "/lab/captcha-bypass/bypass1", + "vulnID": 14 + } + ] +======= + "en": "Running Scripts with API Hacking", + "tr": "API Hacking ile Script Çalıştırma", + "fr": "Exécuter des scripts avec le piratage d'API", + "ar": "" + + }, + "description": { + "en": "Find a way to suppress the 1 per page warning.", + "tr": "Sayfada 1 uyarısı bastırmanın bir yolunu bulunuz.", + "fr": "Trouvez un moyen de supprimer l’avertissement 1 par page.", + "ar": "" + }, + "url": "/lab/api-hacking/api-hacking/", + "vulnID": 13 + } + ] +>>>>>>> bab6308f19302d31407a97fe2766786a6ea75ec8 } ] \ No newline at end of file diff --git a/app/public/assets/img/vulns/api.png b/app/public/assets/img/vulns/api.png new file mode 100644 index 0000000..c50adf0 Binary files /dev/null and b/app/public/assets/img/vulns/api.png differ diff --git a/app/public/assets/img/vulns/captcha.png b/app/public/assets/img/vulns/captcha.png new file mode 100644 index 0000000..3b99828 Binary files /dev/null and b/app/public/assets/img/vulns/captcha.png differ diff --git a/app/resources.json b/app/resources.json index 577db00..b5337d3 100644 --- a/app/resources.json +++ b/app/resources.json @@ -103,5 +103,22 @@ "res": { "1": "https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection" } + }, +<<<<<<< HEAD +======= + +>>>>>>> bab6308f19302d31407a97fe2766786a6ea75ec8 + { + "id": "13", + "lab": "API Hacking", + "res": { +<<<<<<< HEAD + "1": "https://portswigger.net/web-security/api-testing", + "2": "https://iaraoz.medium.com/hacking-apis-building-the-lab-0448e817a5a8", + "3": "https://owasp.org/www-project-api-security/" +======= + "1": "https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/web-api-pentesting" +>>>>>>> bab6308f19302d31407a97fe2766786a6ea75ec8 + } } -] \ No newline at end of file +] \ No newline at end of file