Kali Linux

4-ZERO-3 : 403/401 Bypass Methods + Bash Automation

4-ZERO-3 Tool to bypass 403/401. This script contain all the possible techniques to do the same.

  • NOTE : If you see multiple [200 Ok]/bypasses as output, you must check the Content-Length. If the content-length is same for multiple [200 Ok]/bypasses means false positive. Reason can be “301/302” or “../” [Payload] DON’T PANIC.
  • Script will print cURL PAYLOAD if possible bypass found.

Preview

Help

root@me_dheeraj:$ bash 403-bypass.sh -h

 Usage / Modes

  • Scan with specific payloads:

--header ] Support HEADER based bypasses/payloads

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –header

--protocol ] Support PROTOCOL based bypasses/payloads

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –protocol

 --port ] Support PORT based bypasses/payload

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –port

--HTTPmethod ] Support HTTP Method based bypasses/payload

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –HTTPmethod

--encode ] Support URL Encoded bypasses/payload

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –encode

--SQLi ] Support MySQL mod_Security & libinjection bypasses/payloads [** New **]

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –SQLi

  • Complete Scan {includes all exploits/payloads} for an endpoint [ –exploit ]

root@me_dheeraj:$ bash 403-bypass.sh -u https://target.com/secret –exploit

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

4 days ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

4 days ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

5 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

6 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

6 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

6 days ago