Category: Web Application Security
-
XSS Exploitation Using BeEF Framework
What is BeEF.? BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. How to access BeEF using Web GUI.? To access BeEF server open up any web browser and access localhost (127.0.0.1). BeEF runs a web server at port…
-
WebGoat v7.1 Walk-through Series-Part 4
WebGoat v7.1 Web Hacking Simulation WalkThrough Series Part:4 OWASP WebGoat v7.1 Web Hacking Simulation WalkThrough Series Part 4: The Video Includes 1.DOS (Denial of Service) ZipBomb – 0.3 Min Denial of Service from Multiple Logins – 2.03 Min 2.Insecure Communication Insecure Login – 3.11 Min 3.Insecure Storage Encoding Basics –…
-
WebGoat v7.1 Walk-through Series-Part 3
WebGoat v7.1 Web Hacking Simulation WalkThrough Series Part:3 OWASP WebGoat v7.1 Web Hacking Simulation WalkThrough Series Part 3: 1.Cross-Site Scripting. Description: It includes Phishing with XSS – 0.25 min LAB: Cross Site Scripting – 3.17 min Stage 1: Stored XSS – 3.17 min Stage 3: Stored XSS Revisited -7.24 min Stage 5: Reflected XSS –…
-
WebGoat v7 .1 Walk-through Series Part 2
OWASP WebGoat v7 .1 Web Hacking Simulation Walk-through Series Part 2 OWASP WebGoat: AJAX Security: • Dangerous Use of Eval • Same Origin Policy Protection Authentication Flaws: • Password Strength • Forgot Password • Multi Level Login 2 • Multi Level Login 1 How to Exploit a Web Based “Off-by-One”…
-
WebGoat v7.1 Walk-through Series-Part 1
OWASP WebGoat v7.1 Web Hacking Simulation WalkThrough Series Part:1 WebGoat: Description: It includes Access Control Flaws: Using an Access Control Matrix : 1.01 min Bypass a Path Based Access Control Scheme : 1:49 Min LAB: Role Based Access Control Stage 1:Bypass Business Layer Access Control : 3:41 Min Stage 3:…
-
Phases of Penetration Testing
Summarizing the Five Phases of Penetration Testing. In the ethical hacker class on our website, the course begins by recapping the five phases of penetration testing. Essentially, the five phases of pen testing is a module that summarizes what the rest of the ethical hacker class is going to look…
-
Best Books for Penetration Tester & Bug Bounty
Since I’ve started this blog, is if I can recommend some good books to read for beginners and experienced penetration testers and Bug Bounty, I want to highlight some hacking books and InfoSec books that I personally liked that cover subjects such as ethical hacking, penetration testing, web application penetration testing and other…
