Skip to main content

Posts

Showing posts from September, 2019

Web Application Hacking Techniques Part - 4

Hacking into Web Applications Introduction     Welcome to the “hacking into web application” module of this workshop. So far, we have been learning a bit of the theoretical part of this module. With a quick walk through of the previous modules, we have covered how web application works, architecture of web applications and what are the different attack vectors usually used to compromise or hack into web applications. What We Will Cover    In this module, we will demonstrate the hands-on labs to show how to hack into web applications. We will cover two labs here, which will be enough to give you the flavor and the concepts on how to hack into any server side web application.   Prerequisites • Recommended to complete previous three modules • Basic understanding of TCP/IP • Web Applications basic knowledge • Understanding basics of SQL injections • Basic knowledge of exploitation concepts • Knowledge of HTML Language and any server side programming language • Lab Virtual Environment for D

Web Application Hacking Techniques Part - 3

Different Attack Vectors for Hacking Web Applications Introduction    In this module, we will be focusing on the different types of attack, which can be targeted to web applications in order to compromise the web application and its underlying database or operating system.   If you are new to hacking, it is highly recommended than you should first complete the previous two modules and jump here to continue the workshop. Types of Web Application Attacks    In this section of the module, we will try to cover most of the vulnerabilities that are usually found in the web applications. It is difficult to explain all of these in detail in a single module. However, we will try to present a basic idea of the background of the vulnerability covering what this vulnerability is used for and the short reason occasionally. 01 Default Login    One of the most common vulnerabilities found in web applications is the default login, which usually occurs due to the user and admin accounts developers crea