Hey Folks, we have an amazing tool for all of you that can reward you if you are a bug bounty hunter and looking for a bug in any web application. 403bypasser automates the techniques used to circumvent access control restrictions on target page. Throughout this tutorial, we’ll show you the installation and some uses of this tool.
Lets talk about it 🙂 !!
We first clone the tool from github, enter the directory and execute the “pip” command to install the necessary dependencies.
git clone https://github.com/yunemse48/403bypasser.git
pip install -r requirements.txt
Now we can operate this tool with the help of “python” utility.
python3 403bypasser.py -h
Why it’s Important
As we know that sometimes we are not able to find the sensitive files of the web server, then it works in that case to find the given sensitive files by using various metacharacters.
python3 403bypasser.py -u http://192.168.1.9 -d htaccess
Great 🙂 !! As you can see it has successfully found the sensitive file by adding the extension ahead.
Hmm 🙂 !! This misconfiguration can easily reward you as there is some juicy stuff in it.
Alright 🙂 !! You can try to access the location of the sensitive file by following the same procedure as in the previous step.
python3 403bypasser.py -u http://192.168.1.9 -d htpasswd
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.