Web Application Technologies OverviewWeb Application ProfilingHTML Source ReviewManual HTML sifting and analysisAutomated HTML sifting and analysisAnalysis of Server-Side File ExtensionsSession ID FingerprintingJSESSIONID string fingerprintingApache Tomcat 4.x and later.Apache Tomcat 3.x and earlier.Caucho Resin 3.0.21 and later.Caucho Resin 3.0.20 and earlier.IBM WebSphere.Sun Java System Application Server.Active Backend Database Technology AssessmentWeb Application Attack StrategiesServer-Side Script VariablesHTTP Request HeadersHTTP Cookie FieldsXML Request ContentWSDL enumerationAttacking via XMLFilter Evasion TechniquesEncoding and obfuscating attack codeHex encoding.Double-hex encoding.HTML UTF-8 and hex encoding.HTTP request smugglingWeb Application VulnerabilitiesAuthentication IssuesDefault/guessable user accountsHTTP form brute forceSession management weaknessesWeak session ID generation.Session fixation.Insufficient timeout and expiration mechanisms.Parameter ModificationCommand injectionOS command injection.Run arbitrary system commands.Modify parameters passed to system commands.Execute additional commands.SQL injection.Microsoft SQL injection testing methodology.Microsoft stored procedures.xp_cmdshell.sp_makewebtask.xp_regread.Bypassing authentication mechanisms.Compromising data using SELECT, INSERT, and UPDATESELECT.INSERT and UPDATE.Advanced SQL injection readingLDAP injectionLDAP authentication bypass.Reading LDAP data.Command injection countermeasuresFilesystem accessCross-site scriptingWeb Security Checklist