top of page

Web App Hacking

url.jpg

Web application or web apps are the interface of a website to the Internet. Many of them are so poorly designed that it is relatively easy to take control or deface these sites. Many of the Content Management Systems (CMS) such as WordPress, Drupal and Joomla have been shown to be bug riddled. Even when these are patched, these CMS's have a multitude of plug-ins that are often poorly designed. 

In this series, we will first familiarize you with Web Technologies and terminology, then look at strategies of hacking web apps, then examine how to find vulnerabilities and then how to exploit them.

 

 

The tutorials in this series include;

1. Web Application Technologies, Part 1

2. Web App Hacking Overview and Strategy for Beginners

3. Getting Started with OWASP-ZAP

4. Hacking Form Authentication with Burp Suite

5. Finding Vulnerable WordPress sites

6. Finding Vulnerabilities in WordPress with wpscan

7. Enumerating Usernames and Passwords

    in WordPress Sites

8. Bruteforce WordPress sites using the XMLRPC

9. Creating a Backdoor to a Website with weevely

10. Cloning a Website with httrack

11. Cross-Site Scripting (XSS) Attacks

12. OS Command Injection

 

13. Directory or Path Traversal

14. Using dirb to Find Hidden Directories

15. Using Wikto to Find Web App Vulnerabilities

16. Using TIDOS as a Comprehensive Web App Vulnerability Assessment

17. Local File Inclusion (LFI) Attack

18. Cross-Site Request Forgery (CSRF)

19. Burp Suite:Bypassing Weak Input Authentication

20. Burp Suite: Testing for Persistent XSS

21. Burp Suite: Remote File Inclusion (RFI)

22. Burp Suite: XXE

bottom of page