Book Image

Mastering Modern Web Penetration Testing

By : Prakhar Prasad, Rafay Baloch
Book Image

Mastering Modern Web Penetration Testing

By: Prakhar Prasad, Rafay Baloch

Overview of this book

Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security. We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book. We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance. Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples. This pragmatic guide will be a great benefit and will help you prepare fully secure applications.
Table of Contents (18 chapters)
Mastering Modern Web Penetration Testing
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Discovering Metasploit modules


As mentioned, the Metasploit framework consists of different kinds of modules, the modules help the penetration tester in making his exploit modular. The following are the important modules from our point of view:

  • Auxiliary module: The auxiliary modules are built-in scripts that perform various types of scanning, fuzzing, and whatnot. However, these scripts never return a shell when they run. The major purpose of this module is to give the penetration tester a wide array of scripts that can help penetrate the target efficiently. For example, the mysql_enum auxiliary module will perform a basic level of information gathering on a given MySQL server.

  • Exploit module: Perhaps, the exploit module is the most exciting part of the framework for a newcomer. The exploit module contains various scripts that contain code to exploit a vulnerability and return back a shell. The exploit module has tons of such scripts which exploit popular vulnerabilities in a wide set of...