Hacking Web Applications: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
(Replaced content with "'''NOTE:''' This page is under construction")
Tags: Replaced Manual revert
Line 1: Line 1:
'''NOTE:''' This page is under construction
'''NOTE:''' This page is under construction
=== Reconnaissance ===
==== Passive ====
===== Dorking =====
===== DNS Enumeration =====
===== Domain Information =====
===== Certificate Information =====
===== Web Stack Technology Identification =====
===== Port Scanning & Service Analysis =====
===== Discovering Historical Data =====
===== ASN Enumeration =====
==== Active ====
===== Security Control Identification =====
===== Port Scanning & Service Enumeration =====
===== Subdomain Enumeration =====
===== Web Stack Technology Identification =====
===== Walking the Application =====
===== Web Crawling =====
===== Source Code Analysis - JavaScript =====
=== Content Discovery ===
===== Subdomain Brute-forcing =====
===== Directory Brute-forcing =====
===== Parameter Fuzzing =====
===== Endpoint Analysis =====
=== Vulnerability Scanning ===
==== CVE Discovery ====
==== Misconfiguration Discovery ====
==== Common Vulns ====
==== Content Management System & Plugins ====
=== Application Analysis ===
==== Bypassing Security Controls ====
==== Exploit Discovery ====
==== Payloads ====
==== Open Redirects ====
==== IDOR ====
==== Authentication ====
==== File Upload Vulnerabilities ====
=== Low Hanging Fruits ===
==== S3 Buckets ====
==== Subdomain Takeover ====
==== Exposed Assets ====
==== Injections ====
==== Default Credentials ====
==== Exposed Secrets ====
=== Tools ===
{| class="wikitable" style="width:600px"
|-
! Tool !! Description !! Link
|-
| Example || Example || Example
|-
| Example || Example || Example
|-
| Example || Example || Example
|}

Revision as of 16:02, 23 September 2023

NOTE: This page is under construction