博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
All Web Application Attack Techniques
阅读量:6419 次
发布时间:2019-06-23

本文共 2916 字,大约阅读时间需要 9 分钟。

Pnig0s1992 P.S:Just follow this to learn Web Attack.

This list is not full, if there is some attack I missed post in thread please.

This list below fits in category Parameter manipulation

  • Arbitary File Deletion
  • Code Execution
  • Cookie Manipulation ( meta http-equiv & crlf injection )
  • CRLF Injection ( HTTP response splitting )
  • Cross Frame Scripting ( XFS )
  • Cross-Site Scripting ( XSS )
  • Directory traversal
  • Email Injection
  • File inclusion
  • Full path disclosure
  • LDAP Injection
  • PHP code injection
  • PHP curl_exec() url is controlled by user
  • PHP invalid data type error message
  • PHP preg_replace used on user input
  • PHP unserialize() used on user input
  • Remote XSL inclusion
  • Script source code disclosure
  • Server-Side Includes (SSI) Injection
  • SQL injection
  • URL redirection
  • XPath Injection vulnerability
  • EXIF


This list below fits in category

MultiRequest parameter manipulation

  • Blind SQL injection (timing)
  • Blind SQL/XPath injection (many types)


This list below fits in category

File checks

  • 8.3 DOS filename source code disclosure
  • Search for Backup files
  • Cross Site Scripting in URI
  • PHP super-globals-overwrite
  • Script errors ( such as the Microsoft IIS Cookie Variable Information Disclosure )


This list below fits in category

Directory checks

  • Cross Site Scripting in path
  • Cross Site Scripting in Referer
  • Directory permissions ( mostly for IIS )
  • HTTP Verb Tampering ( HTTP Verb POST & HTTP Verb WVS )
  • Possible sensitive files
  • Possible sensitive files
  • Session fixation ( jsessionid & PHPSESSID session fixation )
  • Vulnerabilities ( e.g. Apache Tomcat Directory Traversal, ASP.NET error message etc )
  • WebDAV ( very vulnerable component of IIS servers )


This list below fits in category

Text Search Disclosure

  • Application error message
  • Check for common files
  • Directory Listing
  • Email address found
  • Local path disclosure
  • Possible sensitive files
  • Microsoft Office possible sensitive information
  • Possible internal IP address disclosure
  • Possible server path disclosure ( Unix and Windows )
  • Possible username or password disclosure
  • Sensitive data not encrypted
  • Source code disclosure
  • Trojan shell ( r57,c99,crystal shell etc )
  • ( IF ANY )Wordpress database credentials disclosure


This list below fits in category

File Uploads

  • Unrestricted File Upload


This list below fits in category

Authentication

  • Microsoft IIS WebDAV Authentication Bypass
  • SQL injection in the authentication header
  • Weak Password
  • GHDB - Google hacking database ( using dorks to find what google crawlers have found like passwords etc )


This list below fits in category

Web Services - Parameter manipulation & with multirequest

  • Application Error Message ( testing with empty, NULL, negative, big hex etc )
  • Code Execution
  • SQL Injection
  • XPath Injection
  • Blind SQL/XPath injection ( test for numeric,string,number inputs etc )
  • Stored Cross-Site Scripting ( XSS )
  • Cross-Site Request Forgery ( CSRF )
本文转hackfreer51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/500382
,如需转载请自行联系原作者
你可能感兴趣的文章
javascript实现音频mp3播放
查看>>
html5-离线缓存
查看>>
linux系统安装完后的常见工作
查看>>
在Linux服务器、客户端中构建密钥对验证进行远程连接
查看>>
揪出MySQL磁盘消耗迅猛的真凶
查看>>
和“C”的再遇
查看>>
一键安装kubernetes 1.13.0 集群
查看>>
RabbitMq的集群搭建
查看>>
spring boot + mybatis 同时访问多数据源
查看>>
URL中汉字转码
查看>>
[转]go正则实例
查看>>
Selector中关于顺序的注意事项
查看>>
小黑小波比.清空<div>标签内容
查看>>
Java中的ExceptionInInitializerError异常及解决方法
查看>>
Spring 注入bean时的初始化和销毁操作
查看>>
java线程同步原理(lock,synchronized)
查看>>
MyEclipse中使用Hql编辑器找不到Hibernate.cfg.xml文件解决方法
查看>>
yRadio以及其它
查看>>
第四节 对象和类
查看>>
闪迪(SanDisk)U盘防伪查询(官方网站)
查看>>