Purpose: A question-driven, end-to-end workflow from first touch to exploitation and reporting. It integrates your per-vuln methodologies (XSS, SQLi, DOM, CSRF, CORS, XXE, SSTI, SSRF, Path Traversal, Command Injection) and ensures coverage.
- What’s in scope (hosts, APIs, mobile, third-party callbacks)?
- Allowed traffic types (auth, egress, destructive tests)?
- Credentials/roles available? Test accounts? OAST domain?
Artifacts to prepare: Burp project, Collaborator domain, wordlists from this repo, browser with extensions (DOM Invader), headless tools (param miner, content discovery), notes template.
- What endpoints exist? Crawl and dirbust: web root,
/api,/static, backups, admin panels. - What technologies? Fingerprint server/framework, CSP, cookies, headers.
- What inputs exist? Params, JSON bodies, forms, file uploads, cookies, headers, path segments, fragments.
- What roles/flows? Login, forgot password, OAuth flows, admin panels, webhooks.
Deliverable: Endpoint map with request prototypes and suspected sinks.
- Hidden parameters: Use Param Miner; brute candidate names based on frameworks.
- Header sinks: Try
X-Forwarded-Host,X-Original-URL,Referer(SSRF/CSRF bypass),Origin(CORS),Content-Typeswitches. - Cookies: Track values that reflect into DOM/HTML or server logic.
Deliverable: Parameter/header inventory and likely trust boundaries.
- What sources feed the DOM?
location.*,postMessage, storage, cookies. - What sinks?
innerHTML,document.write, attribute setters,eval/new Function, navigation. - Are sanitizers used (DOMPurify/HTMLJanitor) and how can they be bypassed (attr clobbering, focus)?
- Any web messaging without origin checks? JSON.parse on attacker-controlled data?
Reference: DOM Vulnerabilities/Hunt Methodology.md and PoCs.
Ask for each endpoint/input:
- Is the response content or behavior influenced by my input? If yes, what context?
- Is data reflected raw (Reflected XSS), processed in templates (SSTI), concatenated into SQL (SQLi), used in filesystem paths (Traversal), executed by shell (CMDi), fetched server-side (SSRF), parsed as XML (XXE), or protected by CSRF/CORS?
Then follow the relevant methodology:
- XSS: See
XSS/Hunt Methodology.mdand wordlists.-
For exploit-server delivery of final payloads (redirect/navigation pages), see
XSS/wordlists/exploit-delivery.txtfor ready-made templates with placeholders. -
For a CTF PoC of the Cookie Sandwich technique (Tomcat RFC2109 fall-back; quoted cookie parsing), use
XSS/tools/cookie_sandwich_exploit.html.- Reference: PortSwigger research on cookie sandwiches.
- Required query params:
or: open redirect URL (full), e.g.https://victim.tld/redirectorp: open redirect param name, defaultnextxss: reflected XSS endpoint (full), e.g.https://app.victim.tld/searchxp: reflected param name, defaultqrurl: reflecting endpoint that copies cookie into body, e.g.https://tracking.victim.tld/jsonrc: cookie gadget name used by reflector, defaultsessioncname: HttpOnly cookie name to extract, e.g.PHPSESSID
- Optional:
path: cookie Path to bias ordering (default derived fromrurlpathname)ex: your exfil endpoint to receive the value viasendBeacon/POSTwrap:1to wrap the payload in<script>for HTML sinks (default1)auto:1to auto-redirect the victim, otherwise shows the crafted link
- Flow: The page crafts an XSS payload that sets
$Version=1and two quoted cookies so the target HttpOnly cookie is sandwiched between known markers, then calls the reflecting endpoint with credentials and extracts the value. It optionally beacons toex. Finally, it alerts the captured value for visual confirmation. - Usage example (open in your exploit server and substitute the values):
XSS/tools/cookie_sandwich_exploit.html?auto=1&or=https://victim.tld/redirect&orp=next&xss=https://app.victim.tld/search&xp=q&rurl=https://tracking.victim.tld/json&rc=session&cname=PHPSESSID&path=/json
-
Minimal, hardcoded landing page (simplest flow):
XSS/tools/cookie_sandwich_min.html- Edit the
CONFIGobject at the top with your XSS endpoint, reflecting endpoint, cookie names, and path. - Host the file and send the victim directly; it auto-navigates to the XSS URL with the embedded sandwich payload.
- Edit the
-
- REGEXSS (Regex-based XSS): See
XSS/REGEXSS Hunt Methodology.md,XSS/Regex XSS Cheatsheet.md, and the new wordlists underXSS/wordlists/regexss-*.txt. A helper scanner lives atXSS/tools/regexss_dom_scanner.py. - DOM: See
DOM Vulnerabilities/Hunt Methodology.md. - SQLi: See
SQL Injections/DBMS Hunt Methodology.md. - CSRF: See
CSRF/Hunt Methodology.mdand PoCs. - CORS: See
CORS/Hunt Methodology.mdand PoCs. - XXE: See
XXE/Hunt Methodology.md. - SSTI: Use
SSTI/wordlists/*by engine. - SSRF: See
Server-Side Request Forgery/Hunt Methodology.mdand wordlists. - Path Traversal: See
Path Traversal/Hunt Methodology.md. - Command Injection: See
Command Injections/Hunt Methodology.mdand wordlists.
- Roles and privilege: Horizontal/vertical access checks; IDORs.
- Session handling: Cookie flags (HttpOnly, Secure, SameSite); session fixation; logout/rotation.
- CSRF protections: Tokens, origin/referrer validation, SameSite behaviors.
Reference: CSRF/Hunt Methodology.md and your encounters.
- SSRF egress: Can the app make requests to internal nets/metadata? (Use SSRF lists.)
- Webhooks and importers: URL filters, redirects, protocol smuggling.
- Third-party SDKs/widgets: CORS, token leaks, postMessage.
- Can SSRF reach an admin panel that is path-traversable or vulnerable to SSTI?
- Can traversal expose config that enables SQLi or XXE endpoints?
- Can DOM clobbering enable XSS that steals CSRF tokens to change state?
Document chains with prerequisites and impact.
- Prefer safe proofs (delays, OAST pings) before destructive actions.
- Keep payloads minimal; respect scope; use temp files for any write tests.
- For each issue: affected endpoints, payloads, conditions, impact, likelihood, and clear remediation tied to the relevant methodology.
- Include headers, CSP, and config improvements; suggest allowlists, canonicalization, prepared statements, safe APIs, strict origins.
Discovery
- Crawl + dirbust + API discovery
- Param Miner + hidden headers
- JS review for sources/sinks + secrets
Context tests (per input)
- Reflection → XSS/SSTI
- DB errors/timing → SQLi
- File reads/errors → Traversal
- Shell behavior/timing → CMDi
- Network egress/DNS hits → SSRF
- XML parsing/OOB → XXE
- Cross-origin headers → CORS
- State changes without token → CSRF
Tie-back: Use wordlists/PoCs under each folder for focused payloads and escalation paths.
For each vulnerability area, see encounter-cliff-notes.md inside the corresponding folder for plain-language “how I found and exploited it” summaries distilled from your Encounters:
Access Control/encounter-cliff-notes.mdAuthentication/encounter-cliff-notes.mdBusiness Logic Vulnerabilities/encounter-cliff-notes.mdClickjacking/encounter-cliff-notes.mdCommand Injections/encounter-cliff-notes.mdCORS/encounter-cliff-notes.mdCSRF/encounter-cliff-notes.mdDeserialization/encounter-cliff-notes.mdDOM Vulnerabilities/encounter-cliff-notes.mdFile Upload Vulnerabilities/encounter-cliff-notes.mdInformation Disclosure/encounter-cliff-notes.mdPath Traversal/encounter-cliff-notes.mdRequest Smuggling/encounter-cliff-notes.mdServer-Side Request Forgery/encounter-cliff-notes.mdSQL Injections/encounter-cliff-notes.mdSSTI/encounter-cliff-notes.mdXXE/encounter-cliff-notes.md