Chapter 8. Other Web-based Attacks

There are many methods using which we can exploit weaknesses in web applications. In this chapter, we will look at how we can use Perl to automate web application vulnerability discovery for cross-site scripting and file inclusion attacks. We will also be learning how we can effectively exploit these vulnerabilities with a little help from social engineering. Then, we move on to content management systems and how potential vulnerabilities can be discovered with simple Perl programs that utilize online resources for updated exploits. During this, we will cover how to handle different HTTP responses using LWP::UserAgent and how we can creatively use this skill to find more information from our client victim's servers. ...

Get Penetration Testing with Perl now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.