O'Reilly logo

How to Attack and Defend Your Website by Alejandro Caceres, Henry Dalziel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Finding Vulnerabilities

Abstract

At this point, readers have learned about exploitation. In this chapter we discuss how to actually find these vulnerabilities by offering a simple step-by-step process.

Keywords

pentesting process
content management systems (CMS)
filtering bypasses
Hopefully, you have learned a little bit about exploitation in this book. The examples we have given are some of the most basic types of exploits a hacker can execute against a website. Now we will discuss how we actually find these vulnerabilities in the first place.
Hacking is all about being very mechanical and following processes as well as understanding the technologies.
Even if you are attacking a large web application, remember to always check ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required