Page 12 - Hands-On Bug Hunting for Penetration Testers
P. 12
Table of Contents
Summary 142
Questions 143
Further Reading 143
Chapter 9: Framework and Application-Specific Vulnerabilities 144
Technical Requirements 145
Known Component Vulnerabilities and CVEs – A Quick Refresher 147
WordPress – Using WPScan 148
WPScan as a Dockerized CLI 148
Burp and WPScan 153
Ruby on Rails – Rubysec Tools and Tricks 157
Exploiting RESTful MVC Routing Patterns 158
Checking the Version for Particular Weaknesses 158
Testing Cookie Data and Authentication 158
Django – Strategies for the Python App 158
Checking for DEBUG = True 159
Probing the Admin Page 159
Summary 159
Questions 160
Further Reading 160
Chapter 10: Formatting Your Report 161
Technical Requirements 161
Reproducing the Bug – How Your Submission Is Vetted 162
Critical Information – What Your Report Needs 164
Maximizing Your Award – The Features That Pay 165
Example Submission Reports – Where to Look 167
Hackerone Hacktivity 168
Vulnerability Lab Archive 169
GitHub 170
Summary 171
Questions 171
Further Reading 171
Chapter 11: Other Tools 172
Technical Requirements 172
Evaluating New Tools – What to Look For 173
Paid Versus Free Editions – What Makes a Tool Worth It? 173
A Quick Overview of Other Options – Nikto, Kali, Burp Extensions,
and More 176
Scanners 176
Nikto 176
Zed Attack Proxy 176
w3af 176
nmap and python-nmap 177
[ v ]