Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
27
2.3.3
Web Application and Client Side Attacks
It is now time to start learning some
perimeter attacks
. By perimeter attacks, we mean methods
of infiltration that can be reliably done from the internet.
In other words, attacks that can be
initiated without any sort of access to an organization’s internal network.
We begin with an extensive exploration of Web Application attacks. There are two primary
reasons for starting here. The first is that Web vulnerabilities
are among the most common
attacks vectors available to us, since modern web apps usually allow users to submit data to
them. The second is that web applications are inherently visual and therefore provide us with a
nice interface for understanding why our attacks work in the way that they do.
Introduction to Web Applications
begins by covering a methodology, a toolset, and an
enumeration framework related to web applications that will help us throughout the course. It
then covers our first vulnerability class:
Cross-Site Scripting
(XSS).
7
XSS is an excellent
vulnerability to start with because it targets the
user
of a web application
as opposed to the
server running it. Since the vast majority of our regular day-to-day usage of web applications is as
normal users, XSS can be unusually intuitive, compared to other types of attacks.
Due to the fact that XSS targets users, it can be considered both a Web
Application attack and a Client-Side Attack as we’ll soon learn.
We continue our exploration of web application attacks in
Yüklə
Dostları ilə paylaş: