Cross Site Scripting (XSS) is a Client-Side Code Vulnerability which allows an attacker to inject code which can execute malicious scripts. This type of attack can be used to obtain cookies, session tokens, or other sensitive information used with
SQLSUS -G ATTACK
NANO ATTACK
$URL START=’TARGET’;
SQLSUS ATTACK
START
GET <ITEM>
GET TABLES
GET COLUMNS [USERS]
SELECT * FROM USERS
SYNTAX :–
sqlmap -U <target> –dbs
sqlmap -U <target> -d <database> –tables
sqlmap -U <target> -d <database> -T <table> –columns
sqlmap -U <target> -d <dat
SYNTAX :–
nmap -p80 –script=http-sql-injection –script-args==httpsspider.maxpagecount=200 <target>
-p = port number
-script = calling a script from the library
-script-args = lets you customize the
SYNTAX :-
SQLMAP -U HTTP://EXAMPLE.COM –FORMS –BATCH –CRAWL=10 –LEVEL=5 –RISK =3
-U = URL
–FORMS = Parse and Test forms
–BATCH = Non Interactive Mode
–CRAWL = How deep
Spidering is the technique of mapping a website and identifying all the webpages that are accessible to any user. It is the most important tool in Web App Pentesting.
It can be done —
Actively :-
When Active Spidering
A Code Injection Attack which takes advantage of improperly filtered user input to enumerate and manipulate a database.
It means that an –
Attacker can use statements to send commands to a SQL Database and get information back.
ENUMERATION
Enumeration involves Probing of vulnerabilities. It can be performed both Manually and by Scanning too.
NESSUS can be used to perform Enumeration by Scanning. It uses Security Technical Implementation Guide (STIG) to ident
SCANNING AND ENUMERATION
Scanning & Enumeration work hand in hand. After Scanning, Network Map is created through which we have to find the vulnerabilities.
It can be done by tools like NMAP to find out –
PORTS
Common Attack Vectors for Websites are :–
Cross Site Scripting(XSS) => Used to inject code onto a website and bypass access controls.
SQL Injection => Used to enumerate databases.
Local File Inclusion(LFI) => An a
HTTP stands for Hyper Text Markup Language. It is the foundation of communication for Web Applications and Web Pages.
It has various requests which perform different functions. Some of them are :–
GET => Retrieves Data
A Packet is a unit of data which is transported across networks to facilitate communications between hosts.
A Packet is how we browse the web, stream movies, and do everything else on the Internet.
They can be captured by TCPDump and W
1. VEGA : Vulnerability Scanner
2. BURPSUITE : Vulnerability Scanner
3. SQLMAP : SQL Injection Database Enumeration Tool
4. SQLNINJA : SQL Injection Database Enumeration Tool
5. ARACHNI : Web Application Audit Framework
Did You Know?
Cybrary training is FREE
Just create an account now for lifetime access. Members login here.
We recommend always using caution when following any link
Are you sure you want to continue?