Web App Hacking

Web applications or web apps are the interface of a website to the Internet. Many of them are so poorly designed that it is relatively easy to take control or deface these sites. Many of Content Management Systems (CMS) such as WordPress, Drupal, and Joomla are bug-riddled. Even when these are patched, these CMSs have a multitude of plug-ins that are often poorly designed. 

In this series, we will first familiarize you with Web Technologies and terminology, then look at strategies for hacking web apps, and then examine how to find vulnerabilities and how to exploit them.

The tutorials in this series include;

Web App Hacking, Part 09: Cross Site Scripting (XSS)

Welcome back, my fledgling hackers! The next tutorial in this Web App Hacking series involves among the most critical vulnerabilities in web applications, cross site scripting or XSS. XSS annually makes it into the OWASP Top Ten web application vulnerabilities for good reason. In the most simple terms, XSS allows

Read More »

Web App Hacking, Part 10: Directory or Path Traversal

Welcome back, my novice hackers! In this series on Web App Hacking, we are examining multiple ways to hack web sites and web applications. In this particular tutorial we will examine directory or path traversal. In this type of attack, the hacker is able to get access files on the

Read More »

Web App Hacking, Part 11: Local File Inclusion (LFI)

Welcome back, my aspiring Cyber Warriors! In this series–Web App Hacking–we are exploring the many ways that an attacker can compromise Web Applications. In this tutorial, we will explore using Local File Inclusion or LFI. Many scripting languages used in web applications support the use of include() function. These make

Read More »

Web App Hacking, Part 12: Comprehensive Web Recon with TIDoS

Welcome back, my aspiring hackers! As I often say, reconnaissance is a crucial part of hacking. You must carefully and thoroughly gather information on the target before attacking, otherwise you are usually wasting your time and risking detection. There are many tools for this purpose many of which I have

Read More »

Web App Hacking, Part 12: Cross Site Request Forgery (CSRF)

Welcome back, my aspiring cyber warriors! In this series on Web App Hacking, we continue to explore ways to hack web applications (apps). In this tutorial, we will explore Cross Site Request Forgeries or CSRF. CSRF is an attack where the attacker inherits the credentials and privileges of the legitimate

Read More »

Web App Hacking, Part 14: OS Command Injection

Welcome back, my aspiring cyber warriors! In this tutorial on Web App Hacking, we’ll examine Operating System command injection. This web site vulnerability enables the attacker to inject and execute operating system commands into the underlying server and often fully compromise the server and all its data. If the attacker

Read More »

Web App Hacking, Part 15: Web site Fingerprinting with Whatweb

Welcome back, my aspiring cyber warriors! Web sites are built using a variety of technologies (see Web Technologies here). In most cases, before we develop a hacking strategy of the web site, we need to understand the technologies employed in building the website. Web site attacks are not generic. Attacks

Read More »

Web App Hacking: BurpSuite, Part 03: Testing for Persistent XSS

Welcome back, my aspiring cyberwarriors! Cross Site Scripting or XSS is one of the most problematic vulnerabilities in web applications. It ranks among the OWASP Top 10 website vulnerabilities nearly every year. For more on cross-site scripting, check out my post here. In this tutorial, I will demonstrate how to

Read More »

Web App Hacking: Finding Vulnerable WordPress Sites

WordPress-based websites are among the most numerous on this planet (maybe other planets too, but I can’t vouch for that). According to WordPress’s own website, WordPress powers 23% of the top 10 million websites. That’s approximately 2.3 million sites using WordPress! WordPress websites are also among the most vulnerable websites.

Read More »

Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite

Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes to test, evaluate and hack web applications. BurpSuite is among that set of tools that every hacker/pentester/bug bounty hunter should be familiar with! In this tutorial, we will be

Read More »

Web App Hacking: Getting Started with OWASP-ZAP

Web apps are often the best vector to an organization’s server/database, an entry point to their entire internal network. By definition, the web app is designed to take an input from the user and send that input back to the server or database. In this way, the attacker can send

Read More »

Web App Hacking: Katana, A Next-Generation Crawling and Spidering Framework

Welcome back, aspiring cyberwarriors! The ability to effectively map, crawl, and spider web applications can mean the difference between a successful engagement and missing critical vulnerabilities that could compromise an entire organization. Traditional crawling tools have served us well over the years, but as web applications become increasingly complex with

Read More »

Learn more in the courses:

The best introduction to hacking is now an unbeatable deal.​

over 56 hours of video content, 10 expert lead courses, and 3 books.

$149

Master OTW put together a powerhouse bundle with everything you need to start hacking

 You’re not going to find a more loaded starter kit