Chapter 3. Vulnerability Identification

In this chapter, we will cover the following topics:

  • Automated URL-based Directory Traversal
  • Automated Cross-site scripting (parameter and URL)
  • Automated parameter-based Cross-site scripting
  • Automated fuzzing
  • jQuery checking
  • Header-based Cross-site scripting
  • Shellshock checking

Introduction

This chapter focuses on identifying traditional web app vulnerabilities from the Top 10 Open Web Application Security Project (OWASP). This would include Cross-site scripting (XSS), Directory Traversal, and those other vulnerabilities that are simple enough to check for not to warrant their own chapter. This chapter provides a parameter-based and URL-based version of each script to allow for either eventuality and cut down on individual script complexity. Most of these tools have fully crafted alternatives, such as Burp Intruder. The benefit of seeing each tool in its simplistic Python is that it allows you to understand how to build and craft your own versions.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.205.235