Book Image

Mastering Modern Web Penetration Testing

By : Prakhar Prasad, Rafay Baloch
Book Image

Mastering Modern Web Penetration Testing

By: Prakhar Prasad, Rafay Baloch

Overview of this book

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security. We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book. We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance. Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples. This pragmatic guide will be a great benefit and will help you prepare fully secure applications.
Table of Contents (18 chapters)
Mastering Modern Web Penetration Testing
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Command shell


As we discussed earlier in the writing files section, we can easily upload a backdoor shell in a server-side host language and gain a shell. But SQLMap takes this thing to a new level, by simply automating this approach into itself. We can explicitly call for the interactive command line shell by using the --os-shell. SQLMap tries to upload its backdoor reverse shell stager to the document root of the web server, and if things go correctly then it drops us an interactive command line shell of the target. Although at times it can take a different approach as well, for example in MS-SQL systems it may first attempt to use the xp_cmdshell stored procedure to achieve code execution.

Let's try this out as follows:

./sqlmap.py -u http://107.170.95.147/Less-1/?id=1 --os-shell

The output is shown in the following screenshot:

When run, it asks for the platform, which in our case is PHP, and secondly the path to the web server's document root. There can be different locations for the...