Hacker's Notes
search
⌘Ctrlk
The Hacker's Notes
Hacker's Notes
  • THE HACKER'S NOTES
  • Fundamentals
    • Learning Process
    • Computer Fundamentals
    • Network Fundamentals
    • Unix Fundamentals
    • Hacking Fundamentals
  • Pentesting Cheatsheets
    • Pentesting Cheatsheets
    • SQL Injection & XSS Playground
  • offensive security
    • Red Team Infrastructure
    • MITRE ATT&CK
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • Active Directory
    • Active Directory & Kerberos Abuse
  • Reversing, forensics & misc
    • Internals
    • AWS Accounts, Users, Groups, Roles, Policies
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++
    • Reversing Password
  • HACKING MANUEL
    • Hacking Methodology
    • Pentesting Web checklist
  • RECONNAISSANCE
    • OSINT
    • Public info gathering
    • Basic recon
    • Root domains
    • Subdomain Enum
    • DNS (Domain Name Systems) Pentesting
    • MDNS (Multicast DNS) Pentesting
    • Port Scan
    • Network Scanning
    • Host Scanning
    • Packet Scanning
    • Find Leaked API Keys
    • Email Analysis
    • Webs recon
    • Web Basic Pentesting
    • Windows Forensics
    • Active Directory Pentesting
    • AD CS (Active Directory Certificate Services) Pentesting
    • Cloud Info Gathering
    • Dark-Web Search
    • Social Engineering
  • Enumeration
    • 🟢Information Gathering
    • Files
    • SSL/TLS
    • Ports
    • WEB App Technologies
      • Apache ActiveMQ Pentesting
      • Apache Tomcat Pentesting
      • Apache Zeppelin Pentesting
      • API Pentesting
      • Atlassian Confluence Pentesting
      • Cacti Pentesting
      • CGI Pentesting
      • Codiad Pentesting
      • ClipBucket Pentesting
      • Dompdf RCE
      • Dump Git Repository from Website
      • GhostScript Pentesting
      • GraphQL Pentesting
      • Icinga Web Pentesting
      • JBOSS Pentesting
      • JSON.NET Deserialization
      • LaTeX Injection
      • LimeSurvey Pentesting
      • LLM Chatbot Pentesting
      • Log4j Pentesting
      • Microsoft Exchange Server Pentesting
      • Node.js Deserialization
      • OpenCATS Pentesting
      • Restaurant Management System (RMS) Pentesting
      • TeamCity Pentesting
      • Tiny File Manager
      • WebDAV Pentesting
      • Webmin Pentesting
      • wkhtmltopdf SSRF
      • Browser
      • CMS (Content Management System) Pentesting
      • Elasticsearch Pentesting
      • Kibana Pentesting
      • Frameworks
      • JsRender Template Injection
      • JS
      • Pug Pentesting
      • ASP.NET
      • JWT
      • GitHub
      • GitLab
      • WAF (Web Application Firewall) Detection
      • Firebird
      • Jenkins
      • IIS
      • Virtual Hosts (VHOSTS)
      • Firebase
      • OWA
      • OAuth
      • Flask
      • Symfony && Twig
      • Drupal
      • NoSQL (MongoDB, CouchDB)
      • PHP
      • RoR (Ruby on Rails)
      • OneLogin - SAML Login
      • Flash SWF
      • Nginx
      • Python
      • Tomcat
      • Adobe AEM
      • Magento
      • SAP
      • MFA/2FA
      • GWT
      • Jira
      • OIDC (Open ID Connect)
      • ELK
      • Sharepoint
      • Others
    • Unix Enum
    • Windows Enum
  • Exploitation
    • 🟢Pre-Exploitation
    • 🟢Exploitation
    • WEB App Attacks
    • Payloads
    • Reverse Shells
    • File transfer
    • Unix Exploit
    • Window Exploit
  • Privilege Escalation
    • 🟢Post-Exploitation
    • Linux Priv Esca
    • Unix Priv Esca
    • Window Priv Esca
  • PIVOTING/LATERAL MOVEMENT
    • 🟢Lateral Movement
    • 🟢Pivoting
    • Unix Piv/Lateral
    • Pivoting in Linux
    • Window Piv/Lateral
  • DATA EXFILTRATION
    • Unix Data Exfilt
    • Backdoors in Linux
    • Window Data Exfilt
  • PERSISTENCE
    • Unix Persist
    • Cover Your Tracks in Linux
    • Window Persist
  • NETWORK HACKING
    • Apache Hadoop Pentesting
    • ARP (Address Resolution Protocol) Spoofing
    • EthernetIP Pentesting
    • FastCGI Pentesting
    • Firewall
    • GRPC Pentesting
    • ReDoS (Regular Expression Denial of Service)
    • Rsync Pentesting
    • Protocols
  • WIRELESS HACKING
    • Wifi Enum
    • Wifi Exploit
    • Wifi Priv
    • Bluetooth
    • VPN
    • Audio/Tv Hacking
  • EMAIL HACKING
    • IMAP Pentesting
    • POP Pentesting
    • Receive Email as Another Address
    • SMTP Pentesting
  • DATABASE HACKING
    • CouchDB Pentesting
    • InfluxDB Pentesting
    • MongoDB Pentesting
    • MSSQL (Microsoft SQL) Pentesting
    • MySQL Pentesting
    • Neo4j Pentesting
    • PostgreSQL Pentesting
    • Redis Pentesting
    • SQLite Pentesting
  • CLOUD HACKING
    • General
    • AWS
    • Azure
    • GCP
    • CDN - Comain Fronting
    • Docker && Kubernetes
    • Virtual Machine
    • Git Pentesting
    • Gitea Pentesting
    • Gogs Pentesting
  • AI HACKING
    • AI Prompt Injection
    • Attack_techniques
    • Attack_evasions
    • Attack_intents
    • Ai_enabled_app_defense_checklist
    • Ai_sec_questionnaire
    • Ai_threat_model_questions
    • LLM/AI/ML/prompt testing
  • MACHINE LEARNING HACKS
    • Jupyter Notebook Pentesting
    • Orange Data Mining
    • Read HDF5 (H5) File
    • Read PT File
    • Read PT File
    • Computer Vision
    • Data Processing
    • Create Malicious ML Model
  • CODE HACKING
    • Code review
    • Sinks
  • MOBILE HACKING
    • General
    • Android
    • iOS
  • BLOCKCHAIN HACKING
    • Ethereum
    • Attack Methodology
  • CRYPTOGRAPHY HACKING
    • Cryptography Basic
    • Password Safe Pentesting
    • PowerShell Credentials
    • John the Ripper
    • Algorithim Pentesting
    • Key Derivation
    • Math
  • IOT HACKING
    • Printer Pentesting
    • IPP (Internet Printing Protocol) Pentesting
  • HARDWARE HACKING
    • Flipper Zero
    • Firmware Analysis
    • Gerber (GBR) Files
    • MQTT Pentesting
    • NETGEAR Pentesting
    • SAL Logic Analysis
  • WRITEUPS
    • THM Walkthroughs
    • HTB Walkthroughs
    • OSCP Preparation
    • CRTP Prepration
    • Labs writeups
    • Blogs/Gitbooks Links
    • Portswigger writeups
  • BugBounty
    • BugBounty Methodology
    • BugBounty Resources
  • Tools
    • Privacy
    • Steganography
    • Password cracking
    • Windows Tools
    • Burp Suite
    • Scripting
    • Red Team Resources
    • Hacking Tools
    • Internal Pentest
    • Report template
    • Random
    • Wireshark Cheat Sheet
    • Tshark Cheat Sheet
    • Master assessment mindmaps
    • Convert PuTTY Key to OpenSSH Key
    • Decrypt SolarPuTTY Sessions Files
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Enumerationchevron-right
  2. WEB App Technologies

RoR (Ruby on Rails)

hashtag
Brakeman

  • Repository:

LogoGitHub - presidentbeef/brakeman: A static analysis security vulnerability scanner for Ruby on Rails applicationsGitHubchevron-right

Install and run:

hashtag
RoR RCE's

Relevant write-up:

LogoRuby Vulnerabilities: Exploiting Open, Send, and Deserialization…Bishop Foxchevron-right
PreviousPHP Srand Time Abusingchevron-leftNextOneLogin - SAML Loginchevron-right

Last updated 2 months ago

  • Brakeman
  • RoR RCE's
gem install brakeman
brakeman /path/to/rails/application