What's new
Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Solution for Beginner's red flag link, Mask link!!

hakme89

Midle Weight
Депозит
$0
Mask Phishing Link and Open redirect URL bypass bots flag link unsafe Solution for Beginner's

Hi xss.is members and Fam!! today i am going to explain what's mask link and it work with open redirect and why we need to mask our URL and point to open redirect.

An open redirect is a web security vulnerability that occurs when a web application allows users to redirect to external URLs without proper validation or sanitization. This vulnerability can be exploited by attackers to craft malicious URLs that redirect users to a different, potentially harmful, website.

Here's how open redirects typically work:

User Input : The web application takes a user-provided input, such as a URL, as a parameter in a redirect request.
Lack of Validation : The application fails to properly validate or sanitize the user-provided input. This means that the application does not check whether the provided URL is a valid and safe destination.
Redirection : The application performs a redirect to the URL specified by the user input.
Exploitation: An attacker takes advantage of this lack of validation by crafting a malicious URL that points to a harmful website. The attacker may use techniques such as URL encoding to obfuscate the malicious intent.
User Interaction : When a user clicks on the crafted URL, they are redirected to the malicious website, and this can lead to various attacks, such as phishing, session theft, or the delivery of malicious content.



Identifying open redirect vulnerabilities, especially with subdomains, typically involves a combination of manual testing and automated tools. Here are steps you can take to find open redirects with subdomains:

1. Identify Input Points : Identify places in the web application where user input is accepted and used in a redirect. This could be in parameters of URL query strings, form fields, or any other input mechanisms.
2. Test with Trusted URLs : Initially, test the redirect functionality with trusted URLs. Ensure that the application redirects as expected without any security concerns.
3. Craft Malicious URLs : Try crafting URLs with different subdomains and observe the
behavior Example below from "bing dot com"

http://bing {dot) com/ck/a?!&&p=b1685dc2cfed6c5dJmltdHM9MTY4NTU3NzYwMCZpZ3VpZD0wNjJhZmU2NC0yNTg3LTY3NjgtMTJmMi1lZDQ3MjRhZTY2MzImaW5zaWQ9NTE1Nw&ptn=3&hsh=3&fclid=062afe64-2587-6768-12f2-ed4724ae6632&u=a1aHR0cHM6Ly9sb3BlemNhc3Ryb21pbC5jb20v&ntbyWEUSpc42#am1vcmdhbkB5b3JrdGhlYXRyZS5vcmc

I am going to explain how this mask link and open redirect works!!

$$- The encoded string in the URL is URL-encoded. When decoded, it looks like this:

http://bing (dot) com/ck/a?!&&p=b1685dc2cfed6c5d&imts=1685577600&iguid=062afe64-2587-6768-12f2-ed4724ae6632&insid=5157&ptn=3&hsh=3&fclid=062afe64-2587-6768-12f2-ed4724ae6632&u=a1aHR0cHM6Ly9sb3BlemNhc3Ryb21pbC5jb20v&ntbyWEUSpc42#am1vcmdhbkB5b3JrdGhlYXRyZS5vcmc


Here's a breakdown of the decoded parameters:

* p: b1685dc2cfed6c5d
* imts: 1685577600
* iguid: 062afe64-2587-6768-12f2-ed4724ae6632
* insid: 5157
* ptn: 3
* hsh: 3
* fclid: 062afe64-2587-6768-12f2-ed4724ae6632
* u: a1aHR0cHM6Ly9sb3BlemNhc3Ryb21pbC5jb20v
* 'ntbyWEUSpc42'
* #: TWFuamFyb19Hb29GdXp6QHByb3Rvbi5tZQ==

The decoded URL appears to contain various parameters, including an encoded URL in the u parameter, which, when further decoded, is "http://localhost:8080/". If you have specific questions about any of these parameters or their purpose, feel free to ask Google search engine or take pemission from admin to ask my ID.


4. Check Subdomains : Test various subdomains in the redirect parameter to see if the application allows redirects to external subdomains. This includes both legitimate and potentially malicious subdomains.
5. Use Automated Tools : There are various automated tools available that can help in identifying open redirect vulnerabilities. Tools like OWASP ZAP, Burp Suite, or specialized vulnerability scanners may include checks for open redirects. Configure these tools to test subdomains in the redirect parameters.
6. Review Source Code : If you have access to the application's source code, review how the redirect functionality is implemented. Ensure that proper validation is done on user-provided input, and consider using a whitelist of allowed domains.

How does this method help Spammer's & and Hacker's?
It help spammer or hacker to bypass thousands of Webroot bots that detect malicious links and as a spammer you need to know your enemies during your phishing mass-mailing.!
HERE IS LIST OF BOT THAT VERIFY YOUR LINK EITHER LEGITMATE OF MALICOUS LINK BEFORE INBOX VICTIMS EMAIL AND BROWSERS
Anti-spam isp bot
Smtp anti-spam bot
Brave bot scanning
Webroot bot
Google safe-browsing
Email spam filter bot
Microsoft anti-spam bot.
Victims hardware antivirus detection
ETC!

To beat all this bots and get successfully inbox deliverability and long host links and bypass browsers Web root scan, you need to make your script scam page to obfuscation and setup open redirect mask-link!

if you don't have web hacking skill to pen test subdomain to find open redirect, there are many vendor open redirect antibot provider you can config with subdomain if you know what you are doing, antibot open redirect + blocker also help you to make your scam script link fud and bypass fake user's and vpn user and fake netowrk host bots and allow real user's to visit your target links.

Next will be how to crack smtp with open source script. and sorry for any grammar error lolz

Happy phishing and hacking to all xss.is fam!
i am sorry if i didn't complete the tut and add resources is all about security and careful for public.
 
Top