Book Image

Mastering Modern Web Penetration Testing

By : Prakhar Prasad, Rafay Baloch
Book Image

Mastering Modern Web Penetration Testing

By: Prakhar Prasad, Rafay Baloch

Overview of this book

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security. We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book. We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance. Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples. This pragmatic guide will be a great benefit and will help you prepare fully secure applications.
Table of Contents (18 chapters)
Mastering Modern Web Penetration Testing
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Dumping the data – in blind and time-based scenarios


Now, we have looked into error-based techniques, let's focus SQLMap usage on the Boolean blind technique and time-based techniques.

The major problem that we face when performing blind and time-based exploitations is the fact that there is no verbose database error, and if the query result is successful (true) then the appropriate result is displayed on the page, or a blank area is displayed in the case that the result is false.

Regardless of this, the process of extracting the data remains similar to the one I explained earlier, and there are various optimization facilities in SQLMap which we will utilize here.

The scenario will be a classic blind/time-based injection with no error to facilitate us.

If the query is TRUE then the web application throws the output as shown in the following screenshot:

In the case that the query is FALSE then it throws the output as shown in the following screenshot:

If there is no error, then it is a classic...