To Kartick Paul, Ex-System Manager, AAJKAAL, Software Developer and enthusiast who has made my dream come true.
It is an essentially humble effort on my behalf to show that I am overwhelmed with gratitude for your help.
In this book you will learn about implementing an offensive approach toward security bug hunting by finding vulnerabilities in web applications. You will also take a look at the type of tools necessary to build up this particular approach. You will learn how to use hacking tools like Burp Suite , OWASP ZAP , SQlMAP , and DirBuster and you will also get an introduction to Kali Linux. After taking a close look at the types of tools at your disposal, you will set up your virtual lab.
You will then learn how Request Forgery Injection works on web pages and applications in a mission critical setup. Moving on to the most challenging task for any web application developer, or a Penetration tester, you will take a look at how Cross-site Scripting works and learn effective ways to exploit it.
You will then learn how header injection and URL redirection work, along with key tips to find vulnerabilities in them. Keeping in mind how attackers can compromise your web site, you will learn to work with malicious files and automate your approach to defend against these attacks. You will be provided with tips to find and exploit vulnerabilities in the Sender Policy Framework (SPF). Following this, you will get to know how Unintended XML Injection and Command Injection work to keep attackers at bay. In conclusion, you will take a look at different attack vectors used to exploit HTML and SQL injection. Overall, this book will guide you to become a better Penetration tester, and at the same time it will teach you how to earn bounty by hunting bugs in web applications.
Implementan offensive approach to Bug Hunting
Create and manage Request Forgery on web pages
Poison Sender Policy Framework and exploit it
Defend against Cross Site Scripting (XSS) attacks
Inject Header and test URL redirection
Work with malicious files and Command Injection
Resist strongly unintended XML attacks and HTML, SQL injection
Earn Bounty by hunting bugs in web applications
As a beginner, you will learn penetration testing from scratch.
You will gain a complete knowledge of web security.
Learning to find vulnerabilities in web applications will help you become a better Penetration tester.
You will get acquainted with two of the most powerful security tools of penetration testing: Burp Suite and OWASP ZAP.
I wish to record my gratitude to my wife, Kaberi, for her unstinting support and encouragement in the preparation of this book.
I am extremely grateful to Mr. Matthew Moodie, Lead Development Editor, for his numerous valuable suggestions, complementary opinions and thorough thumbing; Nikhil Karkal, Editor and Divya Modi, Coordinating Editor, and the whole Apress team for their persistent support and help.
In the preparation of this book, I have had to consult numerous open source documentation and textbooks on a variety of subjects related to web security research; I thank the countless authors and writers who have written them.
is an author, and tech writer. Being a certified .NET Windows and Web developer, he has specialized in Python security programming, Linux, and many programming languages that include C#, PHP, Python, Dart, Java, and JavaScript. Sanjib has also won Microsoft’s Community Contributor Award in 2011, and he has written “Beginning Ethical Hacking with Python,” “Beginning Ethical Hacking with Kali Linux,” and “Beginning Laravel 5.8 (First and Second Edition)” for Apress.
is a security researcher currently working with Flipkart. He has been an active member of the Null security community for the past 3 Years. His areas of interest include web, mobile, and system security. He writes a security blog at www.prajalkulkarni.com and he is also the lead contributor at project Code Vigilant ( https://codevigilant.com/ ). Code-Vigilant has disclosed 200+ vulnerabilities in various WordPress plugins and themes. In the past, he has disclosed several vulnerabilities in the core components of GLPI, BugGenie, ownCloud, etc. Prajal has also reported many security vulnerabilities to companies like Adobe, Twitter, Facebook, Google, and Mozilla. He has spoken at multiple security conferences and provided training at NullCon2015, NullCon2016, NullCon2018, Confidence 2014, Grace Hopper 2014, etc.
52.15.135.63