Book Image

Attacking and Exploiting Modern Web Applications

By : Simone Onofri, Donato Onofri
5 (1)
Book Image

Attacking and Exploiting Modern Web Applications

5 (1)
By: Simone Onofri, Donato Onofri

Overview of this book

Web attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks. The book starts by emphasizing the importance of mindset and toolset in conducting successful web attacks. You’ll then explore the methodologies and frameworks used in these attacks, and learn how to configure the environment using interception proxies, automate tasks with Bash and Python, and set up a research lab. As you advance through the book, you’ll discover how to attack the SAML authentication layer; attack front-facing web applications by learning WordPress and SQL injection, and exploit vulnerabilities in IoT devices, such as command injection, by going through three CTFs and learning about the discovery of seven CVEs. Each chapter analyzes confirmed cases of exploitation mapped with MITRE ATT&CK. You’ll also analyze attacks on Electron JavaScript-based applications, such as XSS and RCE, and the security challenges of auditing and exploiting Ethereum smart contracts written in Solidity. Finally, you’ll find out how to disclose vulnerabilities. By the end of this book, you’ll have enhanced your ability to find and exploit web vulnerabilities.
Table of Contents (14 chapters)
1
Part 1: Attack Preparation
4
Part 2: Evergreen Attacks
8
Part 3: Novel Attacks

Part 1: Attack Preparation

As a quote incorrectly attributed to Abraham Lincoln but coming from a wise and anonymous lumberjack teaches us, “If I had five minutes to chop down a tree, I’d spend the first three sharpening my axe”.

This leads us to the point that preparation is critical.

So, we will focus on sharpening our tools before performing our attacks. Of course, given the essence of our work, we will only know later what we will need when faced with an unknown vulnerability. The essential tool to have ready is our mind, plus a set of technological tools always at hand.

This part has the following chapters:

  • Chapter 1, Mindset and Methodologies
  • Chapter 2, Toolset for Web Attacks and Exploitation