Abuse Public Web-Application
Typically we try to gain some access tokens which can be found at an endpoint identified in the application’s system environment:
IDENTITY_ENDPOINT
IDENTITY_HEADER
insecure file upload
Upload a simple web command shell like:
or directly try to steal a token, e.g., through:
SSTI
entry fields for testing SSTI
OS Command Injection
Use a simple command script that extracts the needed access tokens, e.g., in Python:
- dont forget the second
; cmd ;
when calling it (depends upon the web application):