< All Penetration Testing and Ethical Hacking (Archive) Notes

Joshua | Penetration Testing and Ethical Hacking | Module 13 - Web Applications

By: Joshua | Related Course: Penetration Testing and Ethical Hacking (Archive) | Published: March 30, 2018 | Modified: March 30, 2018
Join Cybrary


You will be using this alot for web app pen testing

Kali Linux

go to burpsuite

2 part set up

Web browser 


Proxy configure proxy to that which was in the burpsuite along with the port

Mainly acting as a MITM 

can do the analysis you need


NotepadHttp Recon

Windows tool 

open it put in the target address and it will scan the traffic.  Rewatch this

NotepadID Serve


download and open the tool

type in URL and query the server

can look at it like a book

gives you an idea of what is on the server.

Fairly non-intrusive and this is info out in the open


Scan Kali Linux

#nikto -h for help

#nikto -update

allows you to update the tool

need new version 

#apt -get install Nikto

#nikto -update again if a new version

#nikto -h (target) >> date time dest .txt

Actually will generate a lot of false positives



Website that can scan a file and figure if it is a virus


NotepadWeb App Theory

Web App Hacker Handbook


-XSS – exploits the client-server relationship

-Info Leakage

-Content Spoof

-Weak Auth 

-Cross-Site Request Forgery – Forged request between sites

-Brute Force

-predictable Resources

-SQL inject

-Session Fixation 

– No Session Exp.

-Web 1.0 vs. 2.0 web 1.0 static sites. 2.0 more uses.

Web 2.0







-Doc’s (Dropbox)

-User content *Gaming, RSS, SN


-Cookie Poisoning

-Dir traversal

-Unvalidated input

-SQL inject (cheat sheet)

-injec flaws

-XSS (cheat sheet)


-Form Tamper

-Insecure Storage

-Error Handling

-BO-buffer overflow

-Log Tampering

-Acct MGMT

-Session MGMT

-Platform exploits

-Auth Hijack

-Cookie Snooping

-Session Fixation

-Malicious Execution



-XML Poisoning

Countermeasure——Become an expert

USE BURP Suite to learn web process


Kali Linux

#wget –help

#wget (target)

< All Penetration Testing and Ethical Hacking (Archive) Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?