Posts

Showing posts from 2016

Seattle CTF

Image

Flowdock XSS Vulnerability

Image

Offerdeddy HTML Injection Vulnerability

Image

TopnotPad HTML Injection Vulnerability

Image

TopnotePad CSRF Vulnerability

Image

Veridu CSRF Vulnerability POC

Image

Vend CSRF Vulnerability

Image

Vend Privilege Escalation Vulnerability

Image

P9 Access Control Vulnerability POC

Image

Observu CSRF Protection Bypass vulnerability POC

Image

Flexlists CSRF Vulnerability POC

Image

Hootsuite SSRF Vulnerability POC

Image

Eset CSRF Vulnerability POC

Image

CodeHs Open Redirection Vulnerability POC

Image

How to find all links on a website using python

Image
This post demonstrate how to crawl a website and get all the links.

A web crawler also known as a web spider or web robot is a program or automated script which browses the World Wide Web in a methodical, automated manner.

Working of crawlers is very simple basically crawlers starts from the given web page and fetches all the links on that page.
After that they jump to the next page and perform the same operation and so on. Crawlers maintains a stack of URLs so as soon as the URL is visited from stack it will be removed. similarly the crawler fetches all the links untilthe stack become empty. 





As shown the crawler maintains two lists
1. remaining
2. visited 

After that the crawler start fetching all the URL until the stack is empty. As soon as the crawler reads one URL it pops the URL from the list and returns the number of URLs available in the stack i.e. in the remaining list.

Now it find all <a> tag and fetches the link inside the href attribute and then appends the URLs to the remai…

Issue CSRF Vulnerability POC

Image

Oracle Open Redirection Vulnerability POC

Image

Microsoft XSS Vulnerability POC

Image

Edmodo Privilege Escalation Vulnerability POC

Image

TwitchTv CSRF Protection Bypass Vulnerability

Image

Fluxiom CSRF Vulnerability POC

Image

Paymill IDOR Vulnerability POC

Image

Nokia CSRF Protection Bypass Vulnerability

Image

Envoy IDOR Vulnerability POC

Image

Fastmail Email Spoofing Vulnerability POC

Image

Edmodo XSS Vulnerability POC

Image

Edmodo Email Varification Bypass POC

Image