Book Image

Mastering Modern Web Penetration Testing

By : Prakhar Prasad, Rafay Baloch
Book Image

Mastering Modern Web Penetration Testing

By: Prakhar Prasad, Rafay Baloch

Overview of this book

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security. We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book. We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance. Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples. This pragmatic guide will be a great benefit and will help you prepare fully secure applications.
Table of Contents (18 chapters)
Mastering Modern Web Penetration Testing
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

SQLMap and URL rewriting


In the previous example, these parameters were very clear but there's always the question in your mind of the possibility of URL rewriting (mod_rewrite and others), and how SQLMap can deal with this situation. Then SQLMap provides its users with the option of specifying the injection point. If anywhere in the URL supplied to SQLMap contains an asterisk sign (*) then that point will be used as the injection point and SQLMap will start its injection detection tests from there.

Let's assume the target is using rewritten URLs like the following:

https://prakharprasad.com/books/1/view

https://prakharprasad.com/books/2/view

https://prakharprasad.com/books/3/view

Let us see this in action:

As you can see, SQLMap immediately pointed us to the fact that a custom injection marker has been found in the URL, and asks if it should it process the URL accordingly. So with this technique we can clearly inject easily with websites using URL rewriting modules.