Chapter 6. Exploitation – Low Hanging Fruits

In this chapter, we will cover:

  • Abusing file inclusions and uploads
  • Exploiting OS Command Injections
  • Exploiting an XML External Entity Injection
  • Brute-forcing passwords with THC-Hydra
  • Dictionary attacks on login pages with Burp Suite
  • Obtaining session cookies through XSS
  • Step by step basic SQL Injection
  • Finding and exploiting SQL Injections with SQLMap
  • Attacking Tomcat's passwords with Metasploit
  • Using Tomcat Manager to execute code


With this chapter we will begin our coverage of the exploitation phase of a penetration test. This is the main difference between a vulnerability assessment, where the tester identifies vulnerabilities (most of the time using an automated scanner) and issues recommendations ...

Get Kali Linux Web Penetration Testing Cookbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.