Chapter 3

Finding Vulnerabilities

Abstract

At this point, readers have learned about exploitation. In this chapter we discuss how to actually find these vulnerabilities by offering a simple step-by-step process.

Keywords

pentesting process
content management systems (CMS)
filtering bypasses
Hopefully, you have learned a little bit about exploitation in this book. The examples we have given are some of the most basic types of exploits a hacker can execute against a website. Now we will discuss how we actually find these vulnerabilities in the first place.
Hacking is all about being very mechanical and following processes as well as understanding the technologies.
Even if you are attacking a large web application, remember to always check ...

Get How to Attack and Defend Your Website now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.