Hacking Web Applications: Difference between revisions
Jump to navigation
Jump to search
(Replaced content with "'''NOTE:''' This page is under construction") Tags: Replaced Manual revert |
m (Implementing Jason Haddix Methodology geared towards hacktivists) |
||
Line 1: | Line 1: | ||
'''NOTE:''' This page is under construction | '''NOTE:''' This page is under construction | ||
== Web Application Hacking Methodology - Overview == | |||
=== Information Gathering - OSINT === | |||
==== Target Organization ==== | |||
===== Basic Information ===== | |||
====== Name ====== | |||
====== Physical Address ====== | |||
====== Employee Count ====== | |||
====== Employee Roles ====== | |||
====== Target Company TLDs ====== | |||
====== Company Acquisitions ====== | |||
====== Social Media Presence ====== | |||
====== Revenue ====== | |||
====== Leadership ====== | |||
====== Job Openings ====== | |||
==== Organization Employees ==== | |||
===== Email Addresses ===== | |||
===== Phone Numbers ===== | |||
===== Social Media Profiles ===== | |||
===== Breached Emails ===== | |||
===== Breached Usernames ===== | |||
===== Breached Passwords ===== | |||
===== Curriculum Vitae Discovery ===== | |||
=== Reconnaissance === | |||
==== Passive ==== | |||
===== Dorking ===== | |||
===== DNS Enumeration ===== | |||
===== Domain Information ===== | |||
===== Certificate Information ===== | |||
===== Web Stack Technology Identification ===== | |||
===== Port Scanning & Service Analysis ===== | |||
===== Discovering Historical Data ===== | |||
===== ASN Enumeration ===== | |||
==== Active ==== | |||
===== Security Control Identification ===== | |||
===== Port Scanning & Service Enumeration ===== | |||
===== Subdomain Enumeration ===== | |||
===== Web Stack Technology Identification ===== | |||
===== Walking the Application ===== | |||
===== Web Crawling ===== | |||
===== Source Code Analysis - JavaScript ===== | |||
=== Content Discovery === | |||
===== Subdomain Brute-forcing ===== | |||
===== Directory Brute-forcing ===== | |||
===== Parameter Fuzzing ===== | |||
===== Endpoint Analysis ===== | |||
=== Vulnerability Scanning === | |||
==== CVE Discovery ==== | |||
==== Misconfiguration Discovery ==== | |||
==== Common Vulns ==== | |||
==== Content Management System & Plugins ==== | |||
=== Application Analysis === | |||
==== Bypassing Security Controls ==== | |||
==== Exploit Discovery ==== | |||
==== Payloads ==== | |||
==== Open Redirects ==== | |||
==== IDOR ==== | |||
==== Authentication ==== | |||
==== File Upload Vulnerabilities ==== | |||
=== Low Hanging Fruits === | |||
==== S3 Buckets ==== | |||
==== Subdomain Takeover ==== | |||
==== Exposed Assets ==== | |||
==== Injections ==== | |||
==== Default Credentials ==== | |||
==== Exposed Secrets ==== | |||
=== Tools === | |||
{| class="wikitable" style="width:600px" | |||
|- | |||
! Tool !! Description !! Link | |||
|- | |||
| Example || Example || Example | |||
|- | |||
| Example || Example || Example | |||
|- | |||
| Example || Example || Example | |||
|} |
Revision as of 17:37, 11 April 2024
NOTE: This page is under construction
Web Application Hacking Methodology - Overview
Information Gathering - OSINT
Target Organization
Basic Information
Name
Physical Address
Employee Count
Employee Roles
Target Company TLDs
Company Acquisitions
Social Media Presence
Revenue
Leadership
Job Openings
Organization Employees
Email Addresses
Phone Numbers
Social Media Profiles
Breached Emails
Breached Usernames
Breached Passwords
Curriculum Vitae Discovery
Reconnaissance
Passive
Dorking
DNS Enumeration
Domain Information
Certificate Information
Web Stack Technology Identification
Port Scanning & Service Analysis
Discovering Historical Data
ASN Enumeration
Active
Security Control Identification
Port Scanning & Service Enumeration
Subdomain Enumeration
Web Stack Technology Identification
Walking the Application
Web Crawling
Source Code Analysis - JavaScript
Content Discovery
Subdomain Brute-forcing
Directory Brute-forcing
Parameter Fuzzing
Endpoint Analysis
Vulnerability Scanning
CVE Discovery
Misconfiguration Discovery
Common Vulns
Content Management System & Plugins
Application Analysis
Bypassing Security Controls
Exploit Discovery
Payloads
Open Redirects
IDOR
Authentication
File Upload Vulnerabilities
Low Hanging Fruits
S3 Buckets
Subdomain Takeover
Exposed Assets
Injections
Default Credentials
Exposed Secrets
Tools
Tool | Description | Link |
---|---|---|
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |