All Courses
Login / Sign up
Get started

By signing up, you agree to our Terms of Use and Privacy Policy.
Reset your password
Enter your email and we'll send you instructions on how to reset your password.

Hacking Methodology

Web footprinting:

Gathering information related to the web application like-

  • Whois information

  • Netcraft information

  • Firewall information

  • Ports and services running

  • Server and OS discovery

  • Hidden contents

Vulnerability scanners:

Scanners like Nikto, Nessus, URLscan, Acunetix can be used to find out vulnerabilities in a web application.

Identify Entry Points and Attack surface:

The next step is to know the entry points like login screens, URLs, cookies, and output points like display screens, reports, etc. We need to find vulnerabilities to bypass the access controls and break into the application. All the above discussed attacks should be tested for the possibility.

Countermeasures:

  • Always validate the input fields.

  • Limit the entry in the input fields.

  • Check for arbitrary inputs like scripts, SQL injection codes, etc.

  • Use a Web application firewall.

  • Run database accounts with minimal access rights.

  • Use input/output encoding.

  • Use prepared statements and parameterised sql queries to avoid Sql injection.

  • Configure the firewall with strict rules.

  • Use secure protocols.

  • Encrypt cookies.

  • Use random numbers for cookies and proper session expiry.


0 Comments

Add Comment

Subject to Moderate