Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Ethical hacking

Rating
-
Sold
-
Pages
2
Uploaded on
23-02-2023
Written in
2022/2023

this is very useful notes fot the hacking beginner and also and you can start attacking the servers

Institution
Course

Content preview

Bug Bounty Hunting – iframe Injection & HTML Injection

An iframe attack is when a hacker or an attacker embeds malicious code in your website page that
executes various malicious instructions. This is when for example it is usually bundled with malware on
the web server that then redirects the home page to another website. The tools the other tool we will
be using are going to be uh bewap. Iframe injection is going to be used to attack a vulnerable web
application. Be burp will be our intercepting proxy the rest I ‘ll be explaining as we move along all right
so with bwap it ‘s really really very simple. All you need to do is essentially load up the ip address and we
‘re good to go all right. The URL radio is very very important and allows us to specify any particular file
on the local web route so for example we have a file here called 666 and essentially is like a flag that you
‘re supposed to find when fuzzing the web application. For example if I open up 666 you can see that it’s
going to tell us right over here hi little b.



If this uh if this web application was incorrectly configured then that means that we could essentially
view any files on the target web server and how would we do that so for example I have burp suite set
up here and what I ‘m going to do is re-reload this page and it ‘s going to reload it for us I ‘ll enable the
proxy through foxy proxy right over here and I will also turn on intercept. We are only restricted to the
web server or the web root directory. The get request has been formatted incorrectly and the web
application in this case is vulnerable to an html injection attack. The tag is n’t closed which means if we
close it we should be able to execute code now this is because this get request is formatted incorrectly.
The video is sort of out there to explain how you can go about doing this now. The goal of this video was
to explain how it works. We can now move on to command injection and all that good stuff



Bug Bounty Hunting – iframe Injection & HTML Injection

An iframe attack is when a hacker or an attacker embeds malicious code in your website page that
executes various malicious instructions. This is when for example it is usually bundled with malware on
the web server that then redirects the home page to another website. The tools the other tool we will
be using are going to be uh bewap. Iframe injection is going to be used to attack a vulnerable web
application. Be burp will be our intercepting proxy the rest I ‘ll be explaining as we move along all right
so with bwap it ‘s really really very simple. All you need to do is essentially load up the ip address and we
‘re good to go all right. The URL radio is very very important and allows us to specify any particular file
on the local web route so for example we have a file here called 666 and essentially is like a flag that you
‘re supposed to find when fuzzing the web application. For example if I open up 666 you can see that it’s
going to tell us right over here hi little b.



If this uh if this web application was incorrectly configured then that means that we could essentially
view any files on the target web server and how would we do that so for example I have burp suite set
up here and what I ‘m going to do is re-reload this page and it ‘s going to reload it for us I ‘ll enable the
proxy through foxy proxy right over here and I will also turn on intercept. We are only restricted to the
web server or the web root directory. The get request has been formatted incorrectly and the web
application in this case is vulnerable to an html injection attack. The tag is n’t closed which means if we

Written for

Course

Document information

Uploaded on
February 23, 2023
Number of pages
2
Written in
2022/2023
Type
SUMMARY

Subjects

$21.39
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
saishashank

Get to know the seller

Seller avatar
saishashank my own
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions