NoSQL injection
NoSQL injection: methodology and payloads
Detection
Inject each of the following special characters and observe for response changes
Login Bypass
Reset Password - Use parameter arrays
Target only accepts parameters in form-data...
Make use of parameter arrays to send query operators
Some parameter parsing packages support parameter arrays and auto-convert them to the correct format
API
A basic bypass for a Content-Type of application/x-www-form-urlencoded might look like this:
If the login endpoint is accepting JSON, it might look something like this:
Mongo DB Payloads
Time delays
Extract data with time delays

Server-Side Javascript code
Unsubscribe all the emails
Wordlist
Tools
Resources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated

