⌨️
Penetration testing & ethical hacking concepts
search
⌘Ctrlk
⌨️
Penetration testing & ethical hacking concepts
  • Introduction
  • 💿Virtual Machines
    • VirtualBox
    • VMware Workstation
  • 🕵️OSINT
    • What is OSINT?
    • Google dorks
    • Metadata
    • Social media
  • Tools
  • 😨Social Engineering
    • What is social engineering?
    • 7 tricks of social engineering
    • Email phishing
    • Typosquatting
    • Compiled resources
  • 😈MitM attack
    • What is MitM attack?
    • ARP spoof/poison
    • DNS spoof/poison
    • HTTP MitM attack
    • ICMP redirect attack
    • DHCP spoofing
    • Evil twin attack
    • Experiment (guest network)
    • Compiled resources
  • 🔌UPnP exploitation
    • What is UPnP?
    • What is SSDP?
    • IGD functions
    • LAN devices
    • Compiled resources
  • ethernetNetwork Reconnaissance & Attacks
    • What is network recon & attacks?
  • 1️⃣ Network live host discovery
    • What is network live host discovery?
    • nmap
    • arp-scan
    • masscan
  • 2️⃣ Network port scan/services enumeration
    • What is network port scan/services enumeration?
    • nmap
    • netcat
    • rustscan
  • 3️⃣ Network services vulnerability scanning & exploitation
    • What is network vulnerability scanning/exploitation?
    • 20/21 ~ FTP
    • 22 ~ SSH
    • 25 ~ SMTP
    • 53 ~ DNS
    • 80/443 ~ HTTP/HTTPS
    • 88 ~ Kerberos
    • 110 ~ POP3
    • 111/2049 ~ RPC/NFS
    • 139/445 ~ SMB
    • 143 ~ IMAP
    • 161 ~ SNMP
    • 3389 ~ RDP
  • bugVulnerability & exploitation
    • Database
    • Metasploit
    • Msfvenom
  • Misconfigurations
  • binaryReverse Engineering/Binary Exploitation
    • Readings
    • Resources
    • General knowledge
    • Assembly
    • Computer architecture
    • Buffer Overflow
    • Reverse Engineering
    • Tools
  • microchipHardware Exploitation
    • Resource
    • Toolkit
    • Techniques
  • Other important skills
  • Research ideas
  • Past experiments
  • globe-pointerWeb Exploitation
    • Introduction
    • Injection attacks
    • Server-Side attacks
    • Client-Side attacks
    • HTTP Request Smuggling
    • Web Content Discovery
    • Authentication/session management
  • Webshell
  • Web API pentesting
  • OWASP
  • General web knowledge
  • Framework specific
    • Spring Boot (Java)
      • H2 database
  • Methodology
  • 🛣️Attacks on routing protocols
    • What are attacks on routing protocols?
    • BGP hijacking
  • 🏕️To explore
    • MQTT
    • Routersploit
    • DNS rebinding attack
    • LLMNR/mDNS poisoning
  • 👤Anonymity
    • VPN
    • Proxychains
    • TOR
    • Obfuscation
  • binary-lockCredentials brute-force/cracking
    • Introduction
    • Windows SAM database
    • Dictionary attack
    • Rainbow attack
    • Tools
  • hand-fistPost-exploitation
    • Gaining shell
    • Repository
    • Lateral movement & Pivoting
  • person-arrow-up-from-linePrivilege escalation
    • Linux
    • Windows
  • Ⓜ️MITRE ATT&CK
    • Introduction
    • OS Credential Dumping (T1003)
  • 🧰Tools/services
    • Introduction
    • Web application pentesting
    • Information gathering/reconnaissance
    • Network recon & attacks
    • General
    • Wordlists
  • file-chart-columnProfessional report writing
    • Report template
  • Tasks on-the-go
  • Practice
  • user-secretForensics
    • Steganography
  • shield-checkOperational Security (OpSec)
    • Hardening
  • Safe document viewer
  • pencilChallenge write-ups
    • CTFs/Labs/Challenges compilation
    • OverTheWire
    • TryHackMe
    • PicoCTF
    • HackTheBox
    • VulnHub
    • OWASP
    • CSCV 2025
  • brain-circuitAI prompt
    • ChatGPT
  • windowsWindows/Active Directory
    • Introduction
    • Initial Access
    • Enumeration
    • Lateral movement & Pivoting
    • Exploitation techniques
    • Credentials harvesting
    • General
    • Tools
    • Methodology
    • Experimentations
  • 🐉OSCP
    • Resources
    • Practice labs
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Framework specific

Spring Boot (Java)

hashtag
Resources

LogoSBSCAN: A Penetration Testing Tool Focused on the Spring FrameworkMediumchevron-right
LogoSPRING BOOT PENTESTING PART 1- FUNDAMENTALSCertcube labs Cyber Security Research Blogschevron-right
LogoHow I Found and Bypassed a Spring Boot Actuator Information Disclosure BugMediumchevron-right
LogoFuzzing ~98,000 Random Spring Boot Servers For AWS S3 KeysMediumchevron-right
LogoSpring Actuators | Hacktricksblog.1nf1n1ty.teamchevron-right

hashtag
Enumeration

  1. Directory traversal

LogoSecLists/Discovery/Web-Content/Programming-Language-Specific/Java-Spring-Boot.txt at master · danielmiessler/SecListsGitHubchevron-right
  1. Additional endpoints

hashtag
Vulnerabilities

Certain versions of nginx + spring boot are vulnerable to an ACL list bypass attack:

LogoProxy / WAF Protections Bypass | Hacktricksblog.1nf1n1ty.teamchevron-right

PreviousFramework specificchevron-leftNextH2 databasechevron-right

Last updated 3 months ago

  • Resources
  • Enumeration
  • Vulnerabilities
$ gobuster dir -u <target> -w spring-boot.txt
h2-console
...