Home » » webapps attack methods

webapps attack methods

This list below fits in category Parameter manipulation
Arbitary File Deletion
Code Execution
Cookie Manipulation ( meta http-equiv & crlf injection )
CRLF Injection ( HTTP response splitting )
Cross Frame Scripting ( XFS )
Cross-Site Scripting ( XSS )
Directory traversal
Email Injection
File inclusion
Full path disclosure
LDAP Injection
PHP code injection
PHP curl_exec() url is controlled by user
PHP invalid data type error message
PHP preg_replace used on user input
PHP unserialize() used on user input
Remote XSL inclusion
Script source code disclosure
Server-Side Includes (SSI) Injection
SQL injection
URL redirection
XPath Injection vulnerability

This list below fits in category MultiRequest parameter manipulation
Blind SQL injection (timing)
Blind SQL/XPath injection (many types)

This list below fits in category File checks
8.3 DOS filename source code disclosure
Search for Backup files
Cross Site Scripting in URI
PHP super-globals-overwrite
Script errors ( such as the Microsoft IIS Cookie Variable Information Disclosure )

This list below fits in category Directory checks
Cross Site Scripting in path
Cross Site Scripting in Referer
Directory permissions ( mostly for IIS )
HTTP Verb Tampering ( HTTP Verb POST & HTTP Verb WVS )
Possible sensitive files
Possible sensitive files
******* fixation ( j*******id & PHPSESSID ******* fixation )
Vulnerabilities ( e.g. Apache Tomcat Directory Traversal, ASP.NET error message etc )
WebDAV ( very vulnerable component of IIS servers )

This list below fits in category Text Search Disclosure
Application error message
Check for common files
Directory Listing
Email address found
Local path disclosure
Possible sensitive files
Microsoft Office possible sensitive information
Possible internal IP address disclosure
Possible server path disclosure ( Unix and Windows )
Possible username or password disclosure
Sensitive data not encrypted
Source code disclosure
Trojan shell ( r57,c99,crystal shell etc )
( IF ANY )Wordpress database credentials disclosure

This list below fits in category File Uploads
Unrestricted File Upload

This list below fits in category Authentication
Microsoft IIS WebDAV Authentication Bypass
SQL injection in the authentication header
Weak Password
GHDB - Google hacking database ( using dorks to find what google crawlers have found like passwords etc )

This list below fits in category Web Services - Parameter manipulation & with multirequest
Application Error Message ( testing with empty, NULL, negative, big hex etc )
Code Execution
SQL Injection
XPath Injection
Blind SQL/XPath injection ( test for numeric,string,number inputs etc )
Stored Cross-Site Scripting ( XSS )
Cross-Site Request Forgery ( CSRF )

Jika Anda menyukai Artikel di blog ini, Silahkan klik disini untuk berlangganan gratis via email, dengan begitu Anda akan mendapat kiriman artikel setiap ada artikel yang terbit di Creating Website


Harlee Grayson said...

This article is very useful, since i'm an IT student. Great Job!

benefits of social media advertising

Post a Comment

Support : Youtube | Google | Facebook
Copyright © 2011. My Hacking Labs - All Rights Reserved
Template Modify by SanJay KuMar
Proudly powered by Blogger
Related Posts Plugin for WordPress, Blogger...