Hacking Web Applications: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Created page with "'''NOTE:''' This page is under construction")
 
mNo edit summary
Line 1: Line 1:
'''NOTE:''' This page is under construction
'''NOTE:''' This page is under construction
=== Reconnaissance ===
==== Passive ====
===== Dorking =====
===== DNS Enumeration =====
===== Domain Information =====
===== Certificate Information =====
===== Web Stack Technology Identification =====
===== Port Scanning & Service Analysis =====
===== Discovering Historical Data =====
===== ASN Enumeration =====
==== Active ====
===== Security Control Identification =====
===== Port Scanning & Service Enumeration =====
===== Subdomain Enumeration =====
===== Web Stack Technology Identification =====
===== Walking the Application =====
===== Web Crawling =====
===== Source Code Analysis - JavaScript =====
=== Content Discovery ===
===== Subdomain Brute-forcing =====
===== Directory Brute-forcing =====
===== Parameter Fuzzing =====
===== Endpoint Analysis =====
=== Vulnerability Scanning ===
==== CVE Discovery ====
==== Misconfiguration Discovery ====
==== Common Vulns ====
==== Content Management System & Plugins ====
=== Application Analysis ===
==== Bypassing Security Controls ====
==== Exploit Discovery ====
==== Payloads ====
==== Open Redirects ====
==== IDOR ====
==== Authentication ====
==== File Upload Vulnerabilities ====
=== Low Hanging Fruits ===
==== S3 Buckets ====
==== Subdomain Takeover ====
==== Exposed Assets ====
==== Injections ====
==== Default Credentials ====
==== Exposed Secrets ====
=== Tools ===
{| class="wikitable" style="width:600px"
|-
! Tool !! Description !! Link
|-
| Example || Example || Example
|-
| Example || Example || Example
|-
| Example || Example || Example
|}

Revision as of 15:52, 23 September 2023

NOTE: This page is under construction

Reconnaissance

Passive

Dorking
DNS Enumeration
Domain Information
Certificate Information
Web Stack Technology Identification
Port Scanning & Service Analysis
Discovering Historical Data
ASN Enumeration

Active

Security Control Identification
Port Scanning & Service Enumeration
Subdomain Enumeration
Web Stack Technology Identification
Walking the Application
Web Crawling
Source Code Analysis - JavaScript

Content Discovery

Subdomain Brute-forcing
Directory Brute-forcing
Parameter Fuzzing
Endpoint Analysis

Vulnerability Scanning

CVE Discovery

Misconfiguration Discovery

Common Vulns

Content Management System & Plugins

Application Analysis

Bypassing Security Controls

Exploit Discovery

Payloads

Open Redirects

IDOR

Authentication

File Upload Vulnerabilities

Low Hanging Fruits

S3 Buckets

Subdomain Takeover

Exposed Assets

Injections

Default Credentials

Exposed Secrets

Tools

Tool Description Link
Example Example Example
Example Example Example
Example Example Example