TheHackerPlayBook I - Section III - The Throw

Web Application Exploitation

First things first, two good resources for webapp pentest.

OWASP WebApp Testing Guid

The Web Application Hacker’s Handbook

SQL Injection (SQLi)

TODO
Read more about SQL database, how it works, commands, common and advanced vulns and explolits. For advanced ones, blind SQLi is something I have read for sure.

Crosssite Scripting (XSS)

The author talks about XSS attack with BeEF framework. And a little bit of code obfuscation because there exists something called filters.

The recommended link is to a active XSS thread where people post XSS exploit findings.

Reddit XSS Thread

And, below is the cheatsheet from OWSAP on XSS. If you have identified an XSS vulnerability, don’t forget to check this out.

OWSP XSS Cheatsheet

Cross-site Request Forgery (CSRF)

The steps to confirm that a request can be vulnerable to CSRF:

  • tool required - Burp Suite
  • make a request to the target site, most case should be a post request
  • send the reuqest to Repeater
  • click go and send a same request to the target site
  • if the response is with status code 200
  • CSRF confirmed

Session Token Entropy

Entropy here means randomness. It is used to judge if a session token is secure enough.

Determine the entropy of a site’s session token:

  • tool required - Burp Suite
  • make a reuqest to the site
  • in history tab, send the raw response to Sequencer
  • pick the token that you are interested in
  • click Start live capture
  • results will be shown in a new window

It is hard to determine if a session token is well randomized. Sometimes, going over the source code is also needed to aid the process.

Fuzzing/Input validation

Here the author talks about the use of the Intruder function of Burp Suite. Nothing fancy. But have to remember this feature when it comes to fuzzing or bute forcing sutff.

Business Logic

Basic tests for business logic. So I directly quote the author

  • Testing that users aren’t able to see other user’s sensitive data.
  • Regular users can’t access administrative pages.
  • Users can’t change data values of other users.
  • Workflows cannot be modified outside their intended flow.

Summary

For webapp testing, the ultimate guide is OWSAP Guide for WebApp Testing.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值