Register · · Password forgotten? · |
Baloch Rafay / Балоч Рафай - Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting / Арсенал веб-хакинга:
|
![]() |
Home » Books and magazines » Computer literature » Hacking and security |
DL-List and Torrent activity | |
Size: 49 MB | Registered: 7 months 11 days | Completed: 4 times | |
|
Author | Message | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Find a password ® Gender: Longevity: 9 years Posts: 2288 |
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting / Арсенал веб-: Практическое руководство по современному веб-пентестингу
Год издания: 2025 Автор: Baloch Rafay / Балоч Рафай Издательство: CRC Press ISBN: 978-1-003-37356-8 Язык: Английский Формат: PDF Качество: Издательский макет или текст (eBook) Интерактивное оглавление: Да Количество страниц: 578 Описание: In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This book, penned by an expert in the field, ventures beyond traditional approaches, offering a unique blend of real-world penetration testing insights and comprehensive research. It’s designed to bridge the critical knowledge gaps in cybersecurity, equipping readers with both theoretical understanding and practical skills. What sets this book apart is its focus on real-life challenges encountered in the field, moving beyond simulated scenarios to provide insights into real-world scenarios. The core of Web Hacking Arsenal is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This proactive approach ensures the book’s relevance over time, empowering readers to stay ahead in the ever-changing cybersecurity landscape. Key Features In-depth exploration of web application penetration testing, based on real-world scenarios and extensive field experience. Comprehensive coverage of contemporary and emerging web security threats, with strategies adaptable to future challenges. A perfect blend of theory and practice, including case studies and practical examples from actual penetration testing. Strategic insights for gaining an upper hand in the competitive world of bug bounty programs. Detailed analysis of up-to-date vulnerability testing techniques, setting it apart from existing literature in the field. This book is more than a guide; it’s a foundational tool that empowers readers at any stage of their journey. Whether you’re just starting or looking to elevate your existing skills, this book lays a solid groundwork. Then it builds upon it, leaving you not only with substantial knowledge but also with a skillset primed for advancement. It’s an essential read for anyone looking to make their mark in the ever-evolving world of web application security. В эпоху цифровых технологий, когда веб-приложения составляют основу нашего взаимосвязанного существования, книга "Арсенал веб-хакинга: Практическое руководство по современному веб-пентестингу" становится незаменимым пособием для овладения искусством и наукой пентестинга веб-приложений. Эта книга, написанная экспертом в данной области, выходит за рамки традиционных подходов и предлагает уникальное сочетание результатов тестирования на проникновение в реальном мире и всесторонних исследований. Она призвана восполнить серьезные пробелы в знаниях в области кибербезопасности, предоставляя читателям как теоретические знания, так и практические навыки. Что отличает эту книгу от других, так это то, что она сосредоточена на реальных задачах, с которыми приходится сталкиваться в полевых условиях, и выходит за рамки смоделированных сценариев, чтобы дать представление о реальных сценариях. Основой "Арсенала веб-хакеров" является его способность адаптироваться к меняющемуся характеру угроз веб-безопасности. Она подготавливает читателя не только к вызовам сегодняшнего дня, но и к непредвиденным сложностям будущего. Такой упреждающий подход обеспечивает актуальность книги с течением времени, позволяя читателям оставаться впереди в постоянно меняющейся среде кибербезопасности. ключевые функции Углубленное изучение тестирования веб-приложений на проникновение, основанное на реальных сценариях и обширном практическом опыте. Всестороннее освещение современных и возникающих угроз веб-безопасности со стратегиями, адаптируемыми к будущим вызовам. Идеальное сочетание теории и практики, включая тематические исследования и практические примеры из реальных тестов на проникновение. Стратегическое понимание того, как одержать верх в конкурентном мире программ вознаграждения за ошибки. Подробный анализ современных методов тестирования на уязвимости, отличающий их от существующей литературы в этой области. Эта книга - не просто руководство; это основополагающий инструмент, который поможет читателям на любом этапе их путешествия. Независимо от того, начинаете ли вы работать или хотите усовершенствовать свои навыки, эта книга заложит прочную основу. Затем она будет опираться на нее, предоставляя вам не только обширные знания, но и набор навыков, необходимых для дальнейшего развития. Это незаменимая книга для тех, кто хочет оставить свой след в постоянно развивающемся мире безопасности веб-приложений. ОглавлениеForeword xxiPreface xxv Acknowledgments xxvii About the Author xxix 1 Introduction to Web and Browser 1 1.1 Introduction 1 1.2 Introduction to HTTP 1 1.2.1 Properties of HTTP 2 1.2.2 HTTP Communications 2 1.2.3 HTTP Response Codes 4 1.2.4 HTTP Request Methods 5 1.3 Common Vulnerabilities in HTTP Headers 6 1.3.1 User-Agent-Based Spoofing 6 1.3.2 Host Header Injection 6 1.3.3 Cross-Domain Referer Leakage 6 1.4 HTTP 2 7 1.5 Evolution of Modern Web Applications 7 1.5.1 Shift in Architecture 7 1.5.2 Evolution in Technology Stacks 8 1.5.3 LAMP Stack 8 1.5.4 MEAN/MERN Stack 8 1.5.5 Single-Page Applications (SPAs) 8 1.5.6 Use of Cloud Components 9 1.5.7 Serverless Architecture 9 1.6 Understanding Data Encoding 9 1.6.1 URL Encoding 11 1.6.2 Double Encoding 11 1.6.3 HTML Encoding 12 1.6.4 Base64 Encoding 13 1.6.5 Unicode Encoding 14 1.7 Introduction to Browsers 14 1.7.1 User Interface 15 1.7.2 Browser Engine 15 1.7.3 Rendering Engine 16 1.7.4 Networking 16 1.7.5 UI Backend 16 1.7.6 JavaScript Interpreter 16 1.7.7 Data Storage 16 1.8 Core Browser Security Policies and Mechanisms 16 1.8.1 Same-Origin Policy 17 1.8.2 Content Security Policy 19 1.8.3 HTTP Cookies 19 1.8.4 Iframe Sandbox 25 1.8.5 Subresource Integrity Check 25 1.8.6 HTTP Strict Transport Layer Security (HSTS) 26 1.9 Policy Exceptions versus Policy Bypasses 27 1.9.1 SOP Bypass Types 27 1.9.2 SOP Bypass—CVE-2007–0981 27 1.9.3 SOP Bypass—CVE-2011–3246 29 1.10 Site Isolation 29 1.11 Address Bar Spoofing Bugs 30 1.11.1 Address Bar Spoofing—Example 1 31 1.11.2 Address Bar Spoofing—Example 2 31 1.11.3 Bypassing Anti-Phishing Filters Using Spoofing 33 1.12 Extra Mile 35 2 Intelligence Gathering and Enumeration 37 2.1 Introduction 37 2.1.1 Enumerating ASN and IP Blocks 38 2.1.2 Reverse IP Lookup 40 2.2 Reverse IP Lookup with Multi-Threadings 41 2.2.1 Scanning for Open Ports/Services 42 2.3 Scanning Open Ports with Masscan 42 2.4 Detecting HTTP Services by Running Httpx 43 2.4.1 Scanning for Service Versions 43 2.5 Subdomain Enumeration 44 2.5.1 Active Subdomain Enumeration 45 2.6 DNSValidator 45 2.7 ShuffleDNS 46 2.8 Subbrute 47 2.9 Gobuster 48 2.9.1 Subdomain Enumeration Subdomains From Content Security Policy 48 2.9.2 Subdomain Enumeration Using Favicon Hashes 49 2.10 Putting It All Together 51 2.10.1 Passive Enumeration of Subdomains 52 2.10.2 Active + Passive Subdomain Enumeration Using Amass 57 2.10.3 Data Consolidation 61 2.11 Subdomain Takeover 62 2.11.1 Automated Subdomain Takeover Using Subjack 64 2.12 Fingerprint Web Applications 64 2.12.1 Directory Fuzzing 65 2.12.2 Discovering Endpoints Using Passive Enumeration Techniques 66 2.12.3 Enumerating Input Parameters 73 2.13 Mapping the Attack Surface Using Crawling/Spidering 75 2.13.1 Crawling Using Gospider 75 2.14 Automatic Mapping of New Attack Surface 78 2.15 Fingerprinting Web Applications 80 2.15.1 Inspecting HTTP Response Headers 81 2.15.2 Forcing Errors for Exposing Versions 81 2.15.3 Fingerprinting Using WhatWeb/Wappalyzer 81 2.15.4 Wappalyzer Browser Extensions 82 2.16 Detecting Known Vulnerabilities and Exploits 83 2.17 Vulnerability Scanning Using Nuclei 84 2.18 Cloud Enumeration 85 2.18.1 AWS S3 Buckets Enumeration 85 2.18.2 Exploiting Misconfigured AWS S3 Buckets 89 2.18.3 Exploiting Authenticated Users Group Misconfiguration 90 2.19 Extra mile 92 3 Introduction to Server-Side Injection Attacks 93 3.1 Introduction to Server-Side Injection Attacks 93 3.2 Introduction to SQL Injection 93 3.2.1 Classification of SQL Injection 94 3.2.2 SQL Injection Techniques 94 3.2.3 SQLi Data Extraction Using UNION-Based Technique 97 3.3 SQLMap Tip 1 107 3.3.1 SQL Injection to RCE 107 3.4 Retrieving Working Directory 109 3.4.1 Error-Based SQL Injection 110 3.4.2 Boolean SQL Injection 113 3.5 SQLMap Tip 2 117 3.5.1 Time-Based SQL Injection 117 3.5.2 SQLMap Tip 122 3.5.3 Second-Order SQL Injection 122 3.6 SQLMap Tip 3 129 3.6.1 Using Tamper Scripts in SQLMap 129 3.7 Remote Command Execution 133 3.7.1 RCE in Node.js 133 3.7.2 RCE in Flask Application 135 3.8 Server-Side Template Injections (SSTI) 137 3.8.1 Introduction About Templating Engines 137 3.8.2 Identifying Template Injections 139 3.9 Exploiting Template Injections 140 3.9.1 Example # 1 (Python, Jinja2) 141 3.9.2 Example # 2 (Python, Mako) 144 3.10 NoSQL Injection Vulnerabilities 146 3.10.1 MongoDB NoSQL Injection Exploitation 147 3.10.2 NoSQL Injection Real-World Examples 150 3.11 Extra Mile 151 4 Client-Side Injection Attacks 152 4.1 Introduction to XSS 152 4.2 Types of XSS 153 4.3 Reflected XSS 153 4.4 Understanding Context in XSS 154 4.5 XSS Polyglots 156 4.6 Bypassing HTMLSpecialChars 156 4.7 HTMLSpecialChars without Enquotes 157 4.8 Bypassing HTMLSpecialChars with Enquotes 158 4.9 Bypassing HTMLSpecialChars in SVG Context 159 4.10 Stored XSS 160 4.10.1 DOM-Based XSS 162 4.11 Sources and Sinks 163 4.12 Root Cause Analysis 166 4.13 JQuery DOM XSS 168 4.14 JQuery Example #1 169 4.15 JQuery Example #2 169 4.15.1 Client-Side Template Injections 170 4.16 XSS in AngularJS 171 4.17 XSS in ReactJS 173 4.18 XSS via File Upload 173 4.19 XSS Through SVG File 174 4.20 XSS Through MetaData 175 4.20.1 Weaponizing XSS 176 4.21 XSS to Account Takeover 176 4.22 XSS-Based Phishing Attack 178 4.23 XSS Keylogging 180 4.24 Content Security Policy (CSP) Bypass 180 4.25 CSP Bypass: Example #1 Unsafe Inline 181 4.26 CSP Bypass: Example #2—Third-Party Endpoints and “Unsafe-Eval” 182 4.27 CSP Bypass: Example #3—Data URI Allowed 183 4.28 CSP Bypass: Example #4—XSS Through JavaScript File Upload 184 4.29 Exploiting Browser Bugs for XSS 187 4.30 SOP and Document.Domain 187 4.31 DOM Clobbering 189 4.32 ID and Name Attribute 189 4.33 Example 1: Using Anchor Tag to Overwrite Global Variable 190 4.34 Example 2: Breaking Filters with DOM Clobbering 192 4.35 Cookie Property Overriding 193 4.36 Breaking Github Gist Using DOM Clobbering 193 4.37 Mutation-Based XSS (mXSS) 194 4.38 MXSS Mozilla Bleach Clean Function CVE 2020–6802 197 4.39 Behavior of Browser’s HTML Parser 198 4.40 Extra Mile 198 5 Cross-Site Request Forgery Attacks 200 5.1 Introduction to CSRF Vulnerabilities 200 5.1.1 How Does CSRF Work? 200 5.1.2 Constructing CSRF Payload 202 5.1.3 CSRF Payloads without User Interaction 204 5.1.4 Exploiting CSRF Payload in GET Requests 205 5.1.5 CSRF Payload Delivery 206 5.2 Exploiting JSON-Based CSRF 206 5.2.1 Scenario 1: Missing Content-Type Validation and JSON Formatting 206 5.3 Scenario 2: Content-Type Is Not Validated, But JSON Syntax Is Verified 208 5.4 Scenario 3: When Server Is Expecting Application/JSON Content-Type Header 208 5.5 Automating CSRF POC Generation 208 5.5.1 OWASP ZAP POC Generator 209 5.5.2 CSRF POC Generator 209 5.6 Exploiting Multi-Staged CSRF 210 5.7 Exploiting Weak Anti-CSRF Defenses 214 5.7.1 CSRF Defenses—Weak/Predictable Anti-CSRF Tokens 214 5.7.2 CSRF Bypass—Unverified CSRF Tokens 215 5.7.3 CSRF Bypass—Referer/Origin Check 216 5.7.4 Scenario 1: Application Not Properly Validating Referer Header 217 5.7.5 Scenario 2: Weak Regex for Referer/Origin Validation 218 5.7.6 Scenario 3: Subdomain-Based Referer Validation Bypass 218 5.8 Scenario 4: Inconsistent Handling of Referer Headers 219 5.8.1 Circumventing CSRF Defenses via XSS 219 5.9 SameSite Cookies 222 5.9.1 SameSite Strict Bypass 223 5.9.2 SameSite Strict Bypass via Subdomains 224 5.9.3 SameSite Lax 225 5.9.4 SameSite Lax Bypass 225 5.9.5 SameSite None 226 5.10 Extra Mile 226 6 Webapp File System Attack 227 6.1 Introduction 227 6.2 Directory Traversal Attacks 227 6.3 Directory Traversal on Node.js App 229 6.4 Fuzzing Internal Files with FFUF 231 6.4.1 Directory Traversal and Arbitrary File Creation Vulnerability 232 6.5 File Inclusion Vulnerabilities 233 6.5.1 Local File Inclusion to Remote Code Execution 235 6.5.2 LFI to RCE via Apache Log Files 235 6.5.3 LFI to RCE via SSH Auth Log 237 6.5.4 LFI to RCE Using PHP Wrappers and Protocols 238 6.5.5 LFI to RCE via Race Condition 239 6.6 Local File Disclosure 242 6.7 File Upload Attacks 245 6.7.1 PHP Disable Functions 246 6.8 Bypassing File Upload Restrictions 249 6.8.1 Bypassing Client-Side Validation 249 6.8.2 Bypassing Blacklist-Based Filters 250 6.8.3 Apache. htaccess Override 252 6.8.4 MIME-Type Verification Bypass 253 6.8.5 Bypassing Magic Bytes 255 6.8.6 Method 1: Injecting through EXIF Data 255 6.8.7 Method 2: Raw Insertion 257 6.8.8 Vulnerabilities in Image-Parsing Libraries 257 6.9 Extra Mile 259 7 Authentication, Authorization, and SSO Attacks 260 7.1 Introduction 260 7.2 Attacks against Authentication 261 7.2.1 Username Enumeration 261 7.2.2 Username Enumeration through Timing Attack 262 7.2.3 Brute Force and Dictionary Attacks 263 7.2.4 Brute Forcing HTTP Basic Authentication 264 7.2.5 Attacking Form-Based Authentication 264 7.3 Attacking Account Lockout Policy 267 7.4 Bypassing Rate-Limiting Mechanism 268 7.4.1 Other Ways to Bypass Rate Limiting 269 7.5 Bypassing CAPTCHA 270 7.5.1 Replay Attack 271 7.6 Dynamic CAPTCHA Generation Bypass Using OCR 276 7.7 Abusing Forgot Password Functionality 279 7.7.1 Predictable Reset Token 279 7.8 Password Reset Link Poisoning via Host Header Injection 282 7.9 Attacking Authorization 284 7.9.1 Lack of Access Control 285 7.9.2 Insecure Direct Object References (IDOR) 287 7.9.3 Web Parameter Tampering 289 7.9.4 Attacking JWT 292 7.10 None Algorithm 297 7.11 Attacking OAuth 2.0 299 7.11.1 OAuth Scenario 1: Stealing OAuth Tokens via Redirect_uri 301 7.11.2 OAuth Scenario 2: Stealing Users’ OAuth Tokens via Bypassing Redirect_uri 304 7.12 Attacking SAML 305 7.12.1 SAML Workflow 306 7.12.2 SAML Scenario 1: Response Tampering 306 7.12.3 SAML Scenario 2: Signature Exclusion Attack 309 7.13 Attacking Multi-Factor Authentication 310 7.13.1 Multi-Factor Authentication Bypasses 311 7.13.2 MFA Bypass Scenario: OTP Bypass 311 7.14 Web Cache Deception 314 7.15 Extra Mile 315 8 Business Logic Flaws 316 8.1 Introduction 316 8.2 Business Logic Flaws 316 8.2.1 Unlimited Wallet Balance Manipulation 317 8.2.2 Transaction Duplication Vulnerability 319 8.2.3 Improper Validation Rule Resulting in Business Logic Flaw 320 8.2.4 Exploiting Top-Up Feature to Steal Customer Balance 321 8.2.5 Lack of Validation Leads to Unlimited Card Limit 322 8.2.6 Unauthorized Manipulation of Cart Items Pre-/Post-Authentication 323 8.2.7 Loan Amount Restriction Bypass 325 8.2.8 Abuse of Feature Leads to Unlimited Wallet Balance 326 8.3 Race Condition Vulnerabilities 327 8.3.1 Race Condition Leading to Manipulation of Votes 328 8.3.2 Creating Multiple Accounts with the Same Details Using Race Condition 331 8.3.3 Exploiting Race Condition in Coupon Code Feature for Duplicate Discounts 332 8.4 Extra Mile 333 9 Exploring XXE, SSRF, and Request Smuggling Techniques 335 9.1 Introduction to XML 335 9.2 XML Structure 336 9.2.1 XML DTD 336 9.2.2 External DTD 337 9.2.3 XML Entities 338 9.3 XXE (XML External Entity) 339 9.3.1 XXE Local File Read 340 9.3.2 Remote Code Execution Using XXE 344 9.3.3 XXE JSON to XML 345 9.3.4 XXE Through File Parsing 346 9.3.5 Reading Local Files via php:// 348 9.4 Blind XXE Exploitation Using Out-of-Band (OOB) Channels 349 9.4.1 Parameter Entities 349 9.4.2 OOB XXE via HTTP 350 9.4.3 XXE OOB Using FTP 352 9.4.4 Error-Based Blind XXE 353 9.5 Server-Side Request Forgery (SSRF) 353 9.5.1 SSRF Port Scan 354 9.5.2 File Read with SSRF 356 9.5.3 SSRF in PHP Thumb Application 357 9.5.4 Validation of the Vulnerability 358 9.5.5 SSRF to Remote Code Execution (RCE) 359 9.5.6 Scanning for Open Ports 359 9.5.7 Interacting with Redis and the Gopher Protocol 361 9.5.8 Chaining SSRF with Redis for File Write to Obtain RCE 362 9.5.9 DNS Rebinding in SSRF Attacks 363 9.6 HTTP Request Smuggling/HTTP Desync Attacks 366 9.6.1 CL.TE Technique Leading to Persistent XSS 367 9.6.2 CVE-2019–20372: HTTP Request Smuggling via Error Pages in NGINX 370 9.7 Extra Mile 372 10 Attacking Serialization 373 10.1 Introduction to Serialization 373 10.1.1 Concept of Gadget 374 10.2 Insecure Deserialization/PHP Object Injection 374 10.2.1 PHP Magic Functions 376 10.2.2 PHP Object Injection—Example 376 10.2.3 PHP Object Injection in SugarCRM 378 10.2.4 Input Parameters 379 10.2.5 Finding a Magic Function 380 10.3 Insecure Deserialization—DOT NET 383 10.3.1 Deserialization of the Base64-Encoded Payload 386 10.3.2 ASP.NET Viewstate Insecure Deserialization 386 10.3.3 MAC Validation and Encryption 387 10.3.4 Exploiting with YSOSerial 388 10.3.5 Blacklist3r 388 10.4 Decoding VIEWSTATE 388 10.5 Insecure Deserialization—Python 389 10.5.1 Serializing the Data with Pickle.Dumps 390 10.5.2 Deserializing the Bytes with Pickle.Loads 390 10.6 Insecure Deserialization—Java 395 10.6.1 Gadgets Libraries in Java 396 10.6.2 Insecure Deserialization—Example 396 10.6.3 Vulnerable Code 397 10.6.4 Verifying the Vulnerability 397 10.6.5 Generating the URLDNS Payload 397 10.6.6 Obtaining RCE Using Insecure Deserialization 398 10.6.7 Blackbox Review of Java-Based Applications 401 10.6.8 Java Framework and Libraries Indicators 402 10.7 Extra Mile 402 11 Pentesting Web Services and Cloud Services 403 11.1 Introduction 403 11.1.1 Differences between RPC and REST 404 11.1.2 Monolithic versus Distributed Architecture 404 11.2 Introduction to SOAP 405 11.2.1 Interacting with SOAP Services 406 11.2.2 Invoking Hidden Methods in SOAP 406 11.2.3 SOAP Account-Takeover Vulnerability 409 11.2.4 Remote Code Execution (RCE) in SOAP Service 411 11.2.5 Finding Writable Directory 413 11.2.6 Uploading Shell to Achieve RCE 413 11.3 JSON-RPC Vulnerabilities 414 11.4 REST API 416 11.4.1 Request Methods 417 11.4.2 Identifying REST API Endpoints 417 11.4.3 Example 1: Excessive Data Exposure 418 11.4.4 Example 2: Sensitive Data Exposure 419 11.4.5 Example 3: Unauthorized Modification Using Users’ Profile 420 11.5 GraphQL Vulnerabilities 420 11.5.1 Enumerating GraphQL Endpoint 422 11.5.2 GraphQL Introspection 422 11.6 Response 425 11.6.1 Information Disclosure: GraphQL Field Suggestions 426 11.6.2 GraphQL Introspection Query for Mutation 427 11.7 Response 430 11.8 Response 431 11.9 Serverless Applications Vulnerabilities 431 11.9.1 Functions as a Service (FaaS) 432 11.10 Sensitive Information Exposure 433 11.10.1 Serverless Event Injection 434 11.10.2 Analysis of Vulnerable Code 435 11.11 Extra Mile 437 12 Attacking HTML5 438 12.1 Introduction 438 12.2 Cross-Origin Resource Sharing 438 12.2.1 Weak Access Control Using Origin Header 440 12.2.2 CORS Leading to DOM XSS Vulnerability 441 12.2.3 Exploiting OpenRedirects 443 12.3 Web Storage: An Overview 443 12.3.1 Session Storage 443 12.3.2 Local Storage 444 12.3.3 Session/Local Storage API 444 12.3.4 Security Concerns with Web Storage in HTML5 445 12.3.5 Session Hijacking 445 12.3.6 Second-Order DOM XSS Using Local Storage 445 12.4 IndexedDB Vulnerabilities 447 12.4.1 Scenario—A Notes Application 448 12.5 Web Messaging Attacks Scenarios 451 12.5.1 Sender’s Window 451 12.5.2 Receiver’s Window 452 12.5.3 Security Concerns 452 12.5.4 Not Validating Origin in PostMessage API 452 12.5.5 DOM XSS in PostMessage API 453 12.6 WebWorkers Vulnerabilities 456 12.6.1 Interacting with WebWorker 456 12.6.2 WebWorker DOM XSS 457 12.6.3 Distributed Denial of Service Attacks Using WebWorkers 458 12.6.4 Distributed Password Cracking Using WebWorker 460 12.7 WebSockets 461 12.7.1 WebSocket DOM XSS 462 12.7.2 Cross-Site WebSocket Hijacking (CSWH) 463 12.7.3 WebSocket and Unencrypted Connections 466 12.8 UI Redressing Attacks 466 12.9 Extra Mile 471 13 Evading Web Application Firewalls (WAFs) 472 13.1 Introduction to WAF 472 13.1.1 WAF Detection Methods 472 13.1.2 Regular Expressions 473 13.1.3 Bayesian Analysis 473 13.1.4 Machine Learning 473 13.1.5 Understanding WAF Security Models: Whitelisting and Blacklisting 473 13.1.6 Whitelisting-Based Models 473 13.1.7 Blacklisting-Based Models 474 13.1.8 Fingerprinting WAF 475 13.1.9 Cookie Values 476 13.1.10 Citrix Netscaler 476 13.1.11 F5 Big IP ASM 476 13.1.12 Barracuda WAF 477 13.1.13 HTTP Response Codes 477 13.1.14 ModSecurity 477 13.1.15 Sucuri WAF 478 13.1.16 CloudFlare WAF 478 13.1.17 Connection Close 479 13.2 Bypass WAF—Methodology Exemplified at XSS 480 13.2.1 Injecting Harmless HTML 480 13.2.2 Considerations 480 13.2.3 Injecting Script Tag 480 13.2.4 Testing with Attributes and Corresponding Tags 481 13.2.5 Testing with src Attribute 481 13.2.6 Testing with Srcdoc Attribute 482 13.2.7 Testing with Action Attribute 482 13.3 Testing with Formaction Attribute 482 13.3.1 Testing with Data Attribute 483 13.3.2 Testing with href Attribute 483 13.3.3 Testing with Pseudo-Protocols 484 13.3.4 Using HTML Character Entities for Evasion 487 13.3.5 Injecting Event Handlers 488 13.3.6 Injecting a Fictitious Event Handler 489 13.3.7 Injecting Lesser-Known Event Handlers 489 13.3.8 Injecting Location Object 490 13.3.9 Bypass Using Unicode Separators 491 13.3.10 Using SVG-Based Vectors 493 13.3.11 Bypassing WAF’s Blocking Parenthesis 493 13.3.12 Bypassing Keyword-Based Filters 493 13.3.13 Character Escapes 494 13.3.14 Constructing Strings in JavaScript 494 13.3.15 Accessing Properties through Syntactic Notation 495 13.3.16 Bypassing Keyword-Based Filters Using Non-Alphanumeric JS 496 13.3.17 Alternative Execution Sinks 496 13.3.18 Bypassing WAF’s Decoding Entities 498 13.3.19 Case Study: Laravel XSS Filter Bypass 498 13.3.20 Bypassing Recursive Filters through Tag Nesting 500 13.3.21 Bypassing Filters with Case Sensitivity 500 13.3.22 Bypassing Improper Input Escaping 501 13.3.23 Bypassing Using DOM XSS 503 13.3.24 Example for Disallowed Keywords 504 13.3.25 Using Window.Name Property 504 13.4 Setting the Name Property 505 13.5 Example 1: Using the Iframe Tag 505 13.6 Example 2: Window.open Function 505 13.7 Example 3: Anchor Tag 506 13.7.1 Bypassing Blacklisted “Location” Keyword 506 13.7.2 Variations Using Different Browser Properties 507 13.7.3 Bypassing WAF Using HPP 507 13.8 Example with XSS 507 13.9 Example with SQL Injection 508 13.10 Extra Mile 508 14 Report Writing 509 14.1 Introduction 509 14.2 Reporting Audience 509 14.3 Executive Summary 510 14.3.1 Structure of an Executive Summary 510 14.3.2 Executive Summary Fail 512 14.3.3 Recommendations Report 513 14.4 Findings Summary 513 14.4.1 Overall Strengths 514 14.4.2 Overall Weaknesses 515 14.5 Historical Comparison 515 14.6 Narrative of the Report 516 14.7 Risk Assessment 516 14.7.1 CVSS Scoring 517 14.7.2 Limitations of CVSS 519 14.8 Risk Matrix 519 14.8.1 Risk Assessment and Reporting 520 14.9 Methodology 520 14.10 Technical Report 520 14.11 Organizing the Report 524 14.12 Report Writing Tools 525 14.12.1 ChatGPT for Report Writing 525 14.12.2 Prompt 1 525 14.12.3 Prompt 2 526 14.12.4 Prompt 3 527 14.12.5 Prompt 4 528 14.13 Report Writing Tips 529 14.14 Extra Mile 530 Index 531
|
|||||||||||||||||||||
![]() |
Home » Books and magazines » Computer literature » Hacking and security |
Current time is: 24-Feb 09:35
All times are UTC + 2
You cannot post new topics in this forum
You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum |