bwapp-tutorial.pdf | Secure Communication

Please download to get full document.

View again

of 91
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information Report
Category:

Documents

Published:

Views: 79 | Pages: 91

Extension: PDF | Download: 9

Share
Related documents
Description
bWAPP - Sanjiv Kawa April 2, 2015 10:37 AM / A1 - Injection / HTML Injection - Reflected (GET) HTML Injection - Reflected (POST) HTML Injection - Reflected (Current URL) HTML Injection - Stored (Blog) iFrame Injection LDAP Injection (Search) Mail Header Injection (SMTP) OS Command Injection OS Command Injection - Blind PHP Code Injection Server-Side Includes (SSI) Injection SQL Injection (GET/Search) SQL Injection (GET/Select) SQL Injection (POST/Search) SQL Injection (POST/Select) SQL Inje
Tags
Transcript
  / A1 -Injection /HTML Injection -Reflected (GET)HTML Injection -Reflected (POST)HTML Injection -Reflected (Current URL)HTML Injection -Stored (Blog)iFrame InjectionLDAP Injection (Search)Mail Header Injection (SMTP)OS Command InjectionOS Command Injection -BlindPHP Code InjectionServer-Side Includes (SSI) InjectionSQL Injection (GET/Search)SQL Injection (GET/Select)SQL Injection (POST/Search)SQL Injection (POST/Select)SQL Injection (AJAX/JSON/jQuery)SQL Injection (CAPTCHA)SQL Injection (Login Form/Hero)SQL Injection (Login Form/User)SQL Injection (SQLite)SQL Injection (Drupal)SQL Injection -Stored (Blog)SQL Injection -Stored (SQLite)SQL Injection -Stored (User-Agent)SQL Injection -Stored (XML)SQL Injection -Blind -Boolean-BasedSQL Injection -Blind -Time-BasedSQL Injection -Blind (SQLite)SQL Injection -Blind (Web Services/SOAP)XML/XPath Injection (Login Form)XML/XPath Injection (Search)/ A2 -Broken Auth. & Session Mgmt. /Broken Authentication -CAPTCHA BypassingBroken Authentication -Forgotten FunctionBroken Authentication -Insecure Login FormsBroken Authentication -Logout ManagementBroken Authentication -Password AttacksBroken Authentication -Weak PasswordsSession Management -Administrative PortalsSession Management -Cookies (HTTPOnly)Session Management -Cookies (Secure)Session Management -Session ID in URLSession Management -Strong Sessions/ A3 -Cross-Site Scripting (XSS) /Cross-Site Scripting -Reflected (GET)Cross-Site Scripting -Reflected (POST)Cross-Site Scripting -Reflected (JSON)Cross-Site Scripting -Reflected (AJAX/JSON)  bWAPP -Sanjiv Kawa April 2, 201510:37 AM  bWAPP Page 1  Cross-Site Scripting -Reflected (AJAX/XML)Cross-Site Scripting -Reflected (Back Button)Cross-Site Scripting -Reflected (Custom Header)Cross-Site Scripting -Reflected (Eval)Cross-Site Scripting -Reflected (HREF)Cross-Site Scripting -Reflected (Login Form)Cross-Site Scripting -Reflected (phpMyAdmin)Cross-Site Scripting -Reflected (PHP_SELF)Cross-Site Scripting -Reflected (Referer)Cross-Site Scripting -Reflected (User-Agent)Cross-Site Scripting -Stored (Blog)Cross-Site Scripting -Stored (Change Secret)Cross-Site Scripting -Stored (Cookies)Cross-Site Scripting -Stored (SQLiteManager)Cross-Site Scripting -Stored (User-Agent)/ A4 -Insecure Direct Object References /Insecure DOR (Change Secret)Insecure DOR (Reset Secret)Insecure DOR (Order Tickets)/ A5 -Security Misconfiguration /Arbitrary File Access (Samba)Cross-Domain Policy File (Flash)Cross-Origin Resource Sharing (AJAX)Cross-Site Tracing (XST)Denial-of-Service (Large Chunk Size)Denial-of-Service (Slow HTTP DoS)Denial-of-Service (SSL-Exhaustion)Denial-of-Service (XML Bomb)Insecure FTP ConfigurationInsecure SNMP ConfigurationInsecure WebDAV ConfigurationLocal Privilege Escalation (sendpage)Local Privilege Escalation (udev)Man-in-the-Middle Attack (HTTP)Man-in-the-Middle Attack (SMTP)Old/Backup & Unreferenced FilesRobots File/ A6 -Sensitive Data Exposure /Base64 Encoding (Secret)BEAST/CRIME/BREACH AttacksClear Text HTTP (Credentials)Heartbleed VulnerabilityHost Header Attack (Reset Poisoning)HTML5 Web Storage (Secret)POODLE VulnerabilitySSL 2.0 Deprecated ProtocolText Files (Accounts)/ A7 -Missing Functional Level Access Control /Directory Traversal -DirectoriesDirectory Traversal -FilesHost Header Attack (Cache Poisoning)Host Header Attack (Reset Poisoning)Local File Inclusion (SQLiteManager)   bWAPP Page 2  Remote & Local File Inclusion (RFI/LFI)Restrict Device AccessRestrict Folder AccessServer Side Request Forgery (SSRF)XML External Entity Attacks (XXE)/ A8 -Cross-Site Request Forgery (CSRF) /Cross-Site Request Forgery (Change Password)Cross-Site Request Forgery (Change Secret)Cross-Site Request Forgery (Transfer Amount)/ A9 -Using Known Vulnerable Components /Buffer Overflow (Local)Buffer Overflow (Remote)Drupal SQL Injection (Drupageddon)Heartbleed VulnerabilityPHP CGI Remote Code ExecutionPHP Eval FunctionphpMyAdmin BBCode Tag XSSShellshock Vulnerability (CGI)SQLiteManager Local File InclusionSQLiteManager PHP Code InjectionSQLiteManager XSS/ A10 -Unvalidated Redirects & Forwards /Unvalidated Redirects & Forwards (1)Unvalidated Redirects & Forwards (2)/ Other bugs... /ClickJacking (Movie Tickets)Client-Side Validation (Password)HTTP Parameter PollutionHTTP Response SplittingHTTP Verb TamperingInformation Disclosure -FaviconInformation Disclosure -HeadersInformation Disclosure -PHP versionInformation Disclosure -Robots FileInsecure iFrame (Login Form)Unrestricted File Upload---------------------------Extras --------------------------A.I.M. -No-authentication ModeClient Access Policy FileCross-Domain Policy FileEvil 666 Fuzzing PageManual Intervention Required!Unprotected Admin PortalWe Steal Secrets... (html)We Steal Secrets... (plain)WSDL File (Web Services/SOAP)  bWAPP Page 3  Areas with an asterix next to them have not been listed in this walkthough.HTML Injection -Reflected (GET)HTML Injection -Reflected (POST)HTML Injection -Reflected (Current URL)HTML Injection -Stored (Blog)iFrame InjectionOS Command InjectionOS Command Injection -BlindPHP Code InjectionServer-Side Includes (SSI) InjectionSQL Injection (GET/Search)SQL Injection (GET/Select)SQL Injection (POST/Search)SQL Injection (POST/Select)SQL Injection (Login Form/Hero)SQL Injection (SQLite)SQL Injection (Drupal)SQL Injection -Stored (Blog)SQL Injection -Stored (SQLite)SQL Injection -Stored (User-Agent)SQL Injection -Blind -Boolean-BasedSQL Injection -Blind -Time-BasedXML/XPath Injection (Login Form)*LDAP Injection (Search)*Mail Header Injection (SMTP)*SQL Injection (AJAX/JSON/jQuery)*SQL Injection (CAPTCHA)*SQL Injection (Login Form/User)*SQL Injection -Stored (XML)*SQL Injection -Blind (SQLite)*SQL Injection -Blind (Web Services/SOAP)*XML/XPath Injection (Search) A1: Injection March 31, 20159:03 AM  bWAPP Page 4
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks