Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Ethical hacking-Bug bounty

Beoordeling
-
Verkocht
-
Pagina's
2
Geüpload op
23-02-2023
Geschreven in
2022/2023

Summary of 2 pages for the course Web Development at Web Development (good notes)

Instelling
Vak

Voorbeeld van de inhoud

Bug Bounty Hunting – iframe Injection & HTML Injection

An iframe attack is when a hacker or an attacker embeds malicious code in your website page that
executes various malicious instructions. This is when for example it is usually bundled with malware on
the web server that then redirects the home page to another website. The tools the other tool we will
be using are going to be uh bewap. Iframe injection is going to be used to attack a vulnerable web
application. Be burp will be our intercepting proxy the rest I ‘ll be explaining as we move along all right
so with bwap it ‘s really really very simple. All you need to do is essentially load up the ip address and we
‘re good to go all right. The URL radio is very very important and allows us to specify any particular file
on the local web route so for example we have a file here called 666 and essentially is like a flag that you
‘re supposed to find when fuzzing the web application. For example if I open up 666 you can see that it’s
going to tell us right over here hi little b.



If this uh if this web application was incorrectly configured then that means that we could essentially
view any files on the target web server and how would we do that so for example I have burp suite set
up here and what I ‘m going to do is re-reload this page and it ‘s going to reload it for us I ‘ll enable the
proxy through foxy proxy right over here and I will also turn on intercept. We are only restricted to the
web server or the web root directory. The get request has been formatted incorrectly and the web
application in this case is vulnerable to an html injection attack. The tag is n’t closed which means if we
close it we should be able to execute code now this is because this get request is formatted incorrectly.
The video is sort of out there to explain how you can go about doing this now. The goal of this video was
to explain how it works. We can now move on to command injection and all that good stuff



Bug Bounty Hunting – iframe Injection & HTML Injection

An iframe attack is when a hacker or an attacker embeds malicious code in your website page that
executes various malicious instructions. This is when for example it is usually bundled with malware on
the web server that then redirects the home page to another website. The tools the other tool we will
be using are going to be uh bewap. Iframe injection is going to be used to attack a vulnerable web
application. Be burp will be our intercepting proxy the rest I ‘ll be explaining as we move along all right
so with bwap it ‘s really really very simple. All you need to do is essentially load up the ip address and we
‘re good to go all right. The URL radio is very very important and allows us to specify any particular file
on the local web route so for example we have a file here called 666 and essentially is like a flag that you
‘re supposed to find when fuzzing the web application. For example if I open up 666 you can see that it’s
going to tell us right over here hi little b.



If this uh if this web application was incorrectly configured then that means that we could essentially
view any files on the target web server and how would we do that so for example I have burp suite set
up here and what I ‘m going to do is re-reload this page and it ‘s going to reload it for us I ‘ll enable the
proxy through foxy proxy right over here and I will also turn on intercept. We are only restricted to the
web server or the web root directory. The get request has been formatted incorrectly and the web
application in this case is vulnerable to an html injection attack. The tag is n’t closed which means if we

Geschreven voor

Vak

Documentinformatie

Geüpload op
23 februari 2023
Aantal pagina's
2
Geschreven in
2022/2023
Type
SAMENVATTING

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
saishashank

Maak kennis met de verkoper

Seller avatar
saishashank my own
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
3 jaar
Aantal volgers
0
Documenten
6
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen