J2TEAM Security: A must-have extension for Chrome users. Install now!

All Web Application Attacking Methods

All Web Application Attacking Methods | Juno_okyo's Blog
2 min read
All Web Application Attacking Methods | Juno_okyo's Blog
This list is not full list, if there are some attacks I missed, please comment below.


This list below fits in category Parameter manipulation

  • Arbitary File Deletion
  • Code Execution
  • Cookie Manipulation ( meta http-equiv & crlf injection )
  • CRLF Injection ( HTTP response splitting )
  • Cross Frame Scripting ( XFS )
  • Cross-Site Scripting ( XSS )
  • Directory traversal
  • Email Injection
  • File inclusion
  • Full path disclosure
  • LDAP Injection
  • PHP code injection
  • PHP curl_exec() url is controlled by user
  • PHP invalid data type error message
  • PHP preg_replace used on user input
  • PHP unserialize() used on user input
  • Remote XSL inclusion
  • Script source code disclosure
  • Server-Side Includes (SSI) Injection
  • SQL injection
  • URL redirection
  • XPath Injection vulnerability
  • EXIF

This list below fits in category MultiRequest parameter manipulation

  • Blind SQL injection (timing)
  • Blind SQL/XPath injection (many types)

This list below fits in category File checks
  • 8.3 DOS filename source code disclosure
  • Search for Backup files
  • Cross Site Scripting in URI
  • PHP super-globals-overwrite
  • Script errors ( such as the Microsoft IIS Cookie Variable Information Disclosure )

This list below fits in category Directory checks
  • Cross Site Scripting in path
  • Cross Site Scripting in Referer
  • Directory permissions ( mostly for IIS )
  • HTTP Verb Tampering ( HTTP Verb POST & HTTP Verb WVS )
  • Possible sensitive files
  • Possible sensitive files
  • ******* fixation ( j*******id & PHPSESSID ******* fixation )
  • Vulnerabilities ( e.g. Apache Tomcat Directory Traversal, ASP.NET error message etc )
  • WebDAV ( very vulnerable component of IIS servers )

This list below fits in category Text Search Disclosure
  • Application error message
  • Check for common files
  • Directory Listing
  • Email address found
  • Local path disclosure
  • Possible sensitive files
  • Microsoft Office possible sensitive information
  • Possible internal IP address disclosure
  • Possible server path disclosure ( Unix and Windows )
  • Possible username or password disclosure
  • Sensitive data not encrypted
  • Source code disclosure
  • Trojan shell ( r57,c99,crystal shell etc )
  • ( IF ANY )Wordpress database credentials disclosure

This list below fits in category File Uploads
  • Unrestricted File Upload

This list below fits in category Authentication
  • Microsoft IIS WebDAV Authentication Bypass
  • SQL injection in the authentication header
  • Weak Password
  • GHDB - Google hacking database ( using dorks to find what google crawlers have found like passwords etc )

This list below fits in category Web Services - Parameter manipulation & with multirequest
  • Application Error Message ( testing with empty, NULL, negative, big hex etc )
  • Code Execution
  • SQL Injection
  • XPath Injection
  • Blind SQL/XPath injection ( test for numeric,string,number inputs etc )
  • Stored Cross-Site Scripting ( XSS )
  • Cross-Site Request Forgery ( CSRF )
Leader at J2TEAM. Website: https://j2team.dev/

Bạn có thể thích những bài đăng này

  • 1, Sổ tay SEO 1.0: Ebook gồm các chủ đề sau: 01.Giới thiệu 02. Tìm hiểu Search Engine 03. Search Engine Optimization 03.1.Optimization 03.2. Link Building 03.3. SEO Tips 03.4. SEO …
  • Download : http://www.remote-exploit.org/cgi-bin/fileget?version=bt4-beta-iso Một số thông tin: * Default password to BackTrack 4 hasn’t changed, still root / toor. * KDE …
  • For installation of packages for : Ubuntu: apt-get install program name Fedora: yum install program name Open Suse: yum install nessus program name Debain: apt-get install nessus…
  • so u upload a shell in somewebsite and most of times admin will delete the shell when he detect .. But why u not backdoor anyfile from site So just edit any php file from site and…
  • Lời nói đầu : Hiện nay khi xây dựng một hệ thống mạng thì ta phải làm nhiều bước gồm nhiều thành phần kết hợp lại với nhau, từ thiết bị cho đến hệ điều hành, cho đến các protoco…
  • As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. …

Đăng nhận xét

Cảm ơn bạn đã đọc bài viết!

- Bạn có gợi ý hoặc bình luận xin chia sẻ bên dưới.

- Hãy viết tiếng Việt có dấu nếu có thể!