Book Image

Mastering Modern Web Penetration Testing

By : Prakhar Prasad, Rafay Baloch
Book Image

Mastering Modern Web Penetration Testing

By: Prakhar Prasad, Rafay Baloch

Overview of this book

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security. We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book. We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance. Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples. This pragmatic guide will be a great benefit and will help you prepare fully secure applications.
Table of Contents (18 chapters)
Mastering Modern Web Penetration Testing
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Denial of Service


Denial of Service (DoS) techniques must only be tested in a controlled environment, in which it is easy to recover if the application goes down. Never try them on production systems.

We can force certain image parsing applications or libraries to crash when they try to parse a malformed image file. Today, image parsing code is available in most web applications in the form of image upload, resize, and so on. Let's go through some of the documented techniques of DoS through image files.

The following documented techniques were publicly disclosed by a HackerOne user who goes by the dutchgraa username.

Malicious JPEG file – pixel flood

This technique exploits the way image parsers parse a JPG or JPEG file. Simply speaking, initially, we will take a valid JPEG image with any random pixel dimension, say 100x100. Then we hexedit or programmatically change the dimensions to something very large, such as 65000x65000 in the EXIF dimension as well as the dimension of the image. This...