Hacking Web Applications: Difference between revisions
Jump to navigation
Jump to search
m (Implementing Jason Haddix Methodology geared towards hacktivists) |
mNo edit summary |
||
Line 106: | Line 106: | ||
==== Exploit Discovery ==== | ==== Exploit Discovery ==== | ||
==== | ==== APIs ==== | ||
==== Open Redirects ==== | ==== Open Redirects ==== |
Latest revision as of 17:38, 11 April 2024
NOTE: This page is under construction
Web Application Hacking Methodology - Overview
Information Gathering - OSINT
Target Organization
Basic Information
Name
Physical Address
Employee Count
Employee Roles
Target Company TLDs
Company Acquisitions
Social Media Presence
Revenue
Leadership
Job Openings
Organization Employees
Email Addresses
Phone Numbers
Social Media Profiles
Breached Emails
Breached Usernames
Breached Passwords
Curriculum Vitae Discovery
Reconnaissance
Passive
Dorking
DNS Enumeration
Domain Information
Certificate Information
Web Stack Technology Identification
Port Scanning & Service Analysis
Discovering Historical Data
ASN Enumeration
Active
Security Control Identification
Port Scanning & Service Enumeration
Subdomain Enumeration
Web Stack Technology Identification
Walking the Application
Web Crawling
Source Code Analysis - JavaScript
Content Discovery
Subdomain Brute-forcing
Directory Brute-forcing
Parameter Fuzzing
Endpoint Analysis
Vulnerability Scanning
CVE Discovery
Misconfiguration Discovery
Common Vulns
Content Management System & Plugins
Application Analysis
Bypassing Security Controls
Exploit Discovery
APIs
Open Redirects
IDOR
Authentication
File Upload Vulnerabilities
Low Hanging Fruits
S3 Buckets
Subdomain Takeover
Exposed Assets
Injections
Default Credentials
Exposed Secrets
Tools
Tool | Description | Link |
---|---|---|
Example | Example | Example |
Example | Example | Example |
Example | Example | Example |