Web Hacking and Security - Exploitation
Web Hacking and Security - Exploitation
Web Hacking and Security - Exploitation
Security 101
-Web Exploitation-
…
By Hery Intelligent Technology (HeryIT)
Malaysia Open Cyber Security (MyOPECS)
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Attack & Exploitation
Common Attack
Web exploitation is the process of exploiting
vulnerabilities in web-based applications to gain
Brute-force Attack DDoS Attack
access to sensitive data or control over the app.
Attackers can exploit these vulnerabilities to take Spam Attack SQL Injection
over the entire app, steal sensitive data, or use the
app to launch attacks on other systems. XSS Attack Broken Access Control
CSRF SSRF
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
SQL Injection Payload
SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL
statements are inserted into an entry field for execution.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
POST SQL Injection – Login Bypass
Payload: a’ or ‘a’=‘a
$sql = “SELECT * FROM users WHERE username = ‘” . $_POST[“uname”] .“’ AND password = …“
$_POST[“uname”] = “a”;
$sql = “SELECT * FROM users WHERE username = ‘a’ or ‘a’=‘a’ AND password = …“
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
GET SQL Injection – Database Exploitation
Payload: a’ order by 1--+
Payload: -a’ union all select 1,2,3,4,5--+
$sql = “SELECT * FROM items WHERE id = ‘” . $_GET[“id”] .“’“;
$__GET[“id”] = “a”;
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
XSS Payload
Cross-site scripting is a type of security
Common use XSS Payload vulnerability that can be found in some web
No Payload Description applications.
1 “/> To break the HTML element
XSS attacks enable attackers to inject client-
2 <h1>Hacked</h1> Check supported element side scripts into web pages viewed by other
3 <script>alert(‘test’)</script> Test JS injection users.
4 document.cookie Hijack cookie
A cross-site scripting vulnerability may be
used by attackers to bypass access controls
such as the same-origin policy.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Web Directory Listing
A directory listing vulnerability means that
the webserver lists the contents of its
directories, allowing the attacker to easily
browse all the files within the affected
directories.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Cross Site Request Forgery (CSRF)
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
CSRF – Spam / DDoS Attack
1. Hacker make a normal
2. Server replies HTML form request to get server
without secure token information.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
CSRF – Brute Force
1. Hacker make a normal
2. Server replies Login form request to get server
without secure token information.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Server Site Request Forgery (SSRF)
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Local File Inclusion (LFI)
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Session Hijacking
The Session Hijacking attack compromises the session token by stealing or predicting a valid session token to gain
unauthorized access to the Web Server.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
Broken Access Control (BAC)
Broken access controls are a commonly
encountered and often critical security
vulnerability.
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023
End of slide…
Thank You!
Web Hacking & Security – Web Exploitation Hery Intelligent Technology© 2023