Web Application Hacking

Embed Size (px)

Citation preview

  • 1. Web Application Hacking By Muchammad SholehSharing Knowledge Session, Bank Danamon Lt. 5 KSI

2. Hacking Methodology 3. Computer Search Engine By ShodanHq 4. Shodan Exploits 5. A n I n t r o d u c t io n t o Z A P T h e O W A S P Z e d A tta c k P ro x y 6. Main Feature A ll t h e e s s e n t ia ls f o r w e b a p p lic a t io n t e s t in gI n t e r c e p t in g P r o x yA c t iv e a n d P a s s iv e S c a n n e r sS p id e rR e p o r t G e n e r a t io nB r u t e F o r c e ( u s in g O W A S P D ir B u s t e r c o d e )F u z z in g ( u s in g O W A S P J B r o F u z z c o d e ) 7. The Additional Features A u t o t a g g in gPo rt sca n n e rSm a rt ca rd su p p o rtS e s s io n c o m p a r is o nIn v o k e e xte rn a l a p p sB e a n S h e ll in t e g r a t io nA P I + H e a d le s s m o d eD y n a m ic S S L C e r t if ic a t e sA n t i C S R F t o k e n h a n d lin g 8. http://www.nuovoline.com/order.php?do=etc%2Fpasswd 9. List Tools Scanning and Enumeration Zap ProxyArachniW3AFWapitiOpenVasNessusNikto.PLNMAPShodanHQ 10. Penetration Testing OS Base on OSS Backtrack LinuxKali LinuxOWASPOSWTFSamurai Linux4n6etc 11. Common Vulnerability Reference CVE (Common Vulnerability Exposure)OSVDB (Open Source Vulenerability Database)ExploitDB (http://www.exploit-db.com/)National Vulnerability DatabaseCommon Vulnerability Scoring System (CVSSSIG) -FIRSTCVE Details (http://www.cvedetails.com/)Injector Exploitation ToolsExploit-ID (http://www.exploit-id.com/) 12. EOF