Search
WebApp Hacking
Web applications host sensitive data and critical business functions. Learn to identify weaknesses in code, configurations, and user access.


3 min read
Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite
Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes...
7,445 views

3 min read
Web App Hacking: XXE Vulnerabilities and Attacks
Welcome back, my aspiring Web App cyberwarriors! Among the most important types of web app attacks is the XXE attack. This is the XML...
3,023 views

5 min read
Web App Hacking, Part 9: Cross Site Scripting (XSS)
Welcome back, my fledgling hackers! The next tutorial in this Web App Hacking series involves among the most critical vulnerabilities in...
14,530 views

3 min read
Web App Hacking: BurpSuite, Part 2: Bypass Weak Input Validation to Upload Malware to a Website
Welcome back, my aspiring cyber warriors! In general, we can say that the solution to many injection attacks in web applications is...
4,333 views

2 min read
Web App Hacking: BurpSuite, Part 4: Remote File Inclusion (RFI)
Welcome back, my aspiring web app hackers! In this series on Web App Hacking, we are exploring the multitude of ways of hacking web...
4,074 views

2 min read
Web App Hacking: BurpSuite, Part 3: Testing for Persistent XSS
Welcome back, my aspiring cyberwarriors! Cross Site Scripting or XSS is one of the most problematic vulnerabilities in web applications....
2,309 views

6 min read
Web App Hacking: Online Password Cracking with Burp Suite (Web App Authentication)
Welcome back, my aspiring cyber warriors! In this series, we are exploring the myriad of ways to hack web applications. As you know, web...
22,723 views

5 min read
Web App Hacking, Part 14: OS Command Injection
Welcome back, my aspiring cyber warriors! In this tutorial on Web App Hacking, we'll examine Operating System command injection. This web...
4,843 views

4 min read
Web App Hacking, Part 15: Web site Fingerprinting with Whatweb
Welcome back, my aspiring cyber warriors! Web sites are built using a variety of technologies (see Web Technologies here). In most cases,...
2,986 views

3 min read
Web App Hacking, Part 12: Cross Site Request Forgery (CSRF)
Welcome back, my aspiring cyber warriors! In this series on Web App Hacking, we continue to explore ways to hack web applications (apps)....
4,559 views


5 min read
Web App Hacking: Web Application Technologies, Part 1
Welcome back, my aspiring hackers! Before embarking upon the study of web application hacking, you need to be familiar with the...
17,995 views

3 min read
Web App Hacking, Part 11: Local File Inclusion (LFI)
Welcome back, my aspiring Cyber Warriors! In this series--Web App Hacking--we are exploring the many ways that an attacker can compromise...
4,783 views

4 min read
Web App Hacking, Part 12: Comprehensive Web Recon with TIDoS
Welcome back, my aspiring hackers! As I often say, reconnaissance is a crucial part of hacking. You must carefully and thoroughly gather...
5,334 views

4 min read
Web App Hacking, Part 10: Directory or Path Traversal
Welcome back, my novice hackers! In this series on Web App Hacking, we are examining multiple ways to hack web sites and web...
10,006 views


2 min read
Web App Hacking, Part 8: Cloning a Web Site with httrack
Welcome back, my nascent hackers! Often when attempting to hack a web site, it might be useful to make a copy and work with it off-line....
9,804 views


4 min read
Web App Hacking, Part 6: Exploiting XMLRPC for Bruteforcing WordPress Sites
WordPress is the world's most widely used Content Management System (CMS) for websites, comprising almost 28% of all sites on the...
24,245 views

4 min read
Web App Hacking, Part 7: Injecting a Backdoor into a Website with weevely
Welcome back my rookie Web App Hackers! Often, you will have the opportunity to upload a file to website such a Word Doc, a PDF or a...
13,737 views


3 min read
Web App Hacking: Spidering a Web Site with Web Scarab
Web Applications (apps) provide so much opportunity for mischief by hackers. They can be defaced and compromised and probably most...
2,056 views


3 min read
Web App Hacking: Overview and Strategy for Beginners
In previous tutorials, we have touched on some of the techniques and tools for web app hacking. We looked at web app vulnerability...
8,555 views

3 min read
Web App Hacking, Part 5: Enumerating Users and Bruteforcing Passwords on Wordpress Sites
Welcome back, my newbie hackers! In previous articles this section, I showed you how to find WordPress sites and how to identify the...
21,277 views