Leanpub Header

Skip to main content

Web Application Advanced Hacking

A Hands-On Field Guide to latest techniques used by security researchers and bug bounty hunters

Over the last few years, applications’ technology stack has changed rapidly. Web Application Advanced Hacking (WAAH) shares advanced techniques used by ethical hackers to carry out a thorough penetration test and security audit for modern web applications in a practical, hands-on approach.

Minimum price

$19.99

$25.00

You pay

$25.00

Author earns

$20.00
$

...Or Buy With Credits!

You can get credits monthly with a Reader Membership
PDF
EPUB
WEB
118
Pages
19,143Words
About

About

About the Book

No matter if you're veteran or newcomer to the security field, the key technologies used in today’s web applications are rapidly changing—with more and more data stored in the cloud and applications based on cutting-edge, open-source technologies, penetration testing and security engagement processes have naturally become more complicated.

This book intends to be hands-on and highly practical guide to enhancing your knowledge on modern application stacks. It will help to fill knowledge gaps when it comes to hacking modern web applications by using advanced techniques such as manually identifying and exploiting vulnerabilities for:

  • NoSQL databases
  • JSON Web Token (JWT) & OAuth2.0 Protocols
  • Cloud Storage
  • Advanced Server-Side Request Forgery (SSRF)
  • Application Logical flaws
  • and much more...

All covered in this book using real-life examples!

The skills you gain from this book will help you to expand the scope of your customers' engagements and increase your value as a security professional (or “white-hacker,” as some prefer to be called), as this book will help you dive deep into the underlying concepts beneath pentesting tools.

Author

About the Author

Maor Tal

Maor Tal is a security researcher with more than seven years' experience in various security and software fields. He works as a penetration tester for major global financial institutions and leading high-tech companies to help them in their cyber security posture. His core areas of expertise include web and mobile penetration testing, vulnerability analysis, and red-team engagements. He holds relevant certificates in the field of penetration testing such as eCCPT. He loves to participate in Capture The Flag competitions, bug bounties, security events and share his passion for penetration testing to help security professionals boost their skills and get them to think outside the box.

Contents

Table of Contents

Legal Disclaimer

About the Author

Acknowledgement

Preface

  1. Who is this book for?
  2. A word of favor and caution
  3. What to expect from this book
  4. Feedback and book updates

Chapter 1: Deserialization Attacks

  1. Insecure deserialization
  2. PHP Object Injection

Tip

  1. Python pickle serialization

Tip

Tip

Chapter 2: Type Juggling Attacks

Tip

  1. Type juggling example explained
  2. Special cases with type juggling
  3. “Zero-like” type juggling

Chapter 3: NoSQL Databases

  1. NoSQL injection fundamentals
  2. MongoDB NoSQL injection explained

Tip

  1. Testing MongoDB NoSQL injections

Tip

  1. Attacking CouchDB interfaces

Tip

  1. Remote privilege escalation vulnerability (CVE-2017-12635)
  2. Arbitrary Command Execution (CVE-2017-12636)

Chapter 4: API Hacking GraphQL

  1. GraphQL crash course
  2. Detect GraphQL endpoints
  3. Enumerate GraphQL schema

Tip

  1. SQL injection via GraphQL query

Tip

Chapter 5: Misconfigured Cloud Storage

  1. Enumerate public cloud-storage instances
  2. Misconfigured S3 buckets

Tip

  1. Google Studio insufficient permissions
  2. Automate hunting for cloud storage

Chapter 6: Server-Side Request Forgery

  1. SSRF Exploitation with SSRFmap
  2. Cloud-based SSRF

Tip

  1. SSRF Out-of-Band with XXE
  2. SSRF with Local File Inclusion
  3. Gopher Protocol with SSRF
  4. SSRF with URL redirects

Tip

Chapter 7: Application Logic

  1. Host header Poisoning

Tip

  1. Sensitive Data Exposure

Tip

  1. Mass Assignment

Tip

  1. Replay Attacks
  2. HTTP Response Splitting

Tip

  1. DOM Clobbering
  2. Bypass Business Limit

Tip

Chapter 8: Attacking JSON Web Tokens (JWT)

  1. JWT Format 101
  2. Modify Signature Algorithm
  3. Change Cipher Algorithm
  4. Cracking the JWT Secret

Tip

Chapter 9: Attacking SAML Flows

  1. XML External Entity (XXE) via SAML Assertion
  2. Signature Stripping
  3. Tamper with Self-Signed Signature
  4. XML Signature Wrapping (XSW) Attacks
  5. Comment Truncation Vulnerability

Tip

Chapter 10: Attacking OAuth 2.0 Flows

  1. Insufficient Redirect URI Validation
  2. Cross-Site Request Forgery OAuth Client
  3. Cross-Site Request Forgery Authorization Server
  4. Authorization Code Replay Attack
  5. Access Token Scope Abuse
  6. Token Leakage via Mobile URI scheme

Indexs

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earned over $14 million writing, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub