SlideShare a Scribd company logo
Web Application Hacking
By
Muchammad Sholeh

Sharing Knowledge Session, Bank Danamon Lt. 5 KSI
Web Application Hacking
Web Application Hacking
Web Application Hacking
Web Application Hacking
Web Application Hacking
Web Application Hacking
Hacking Methodology
Web Application Hacking
Computer Search Engine
By ShodanHq
Shodan Exploits
A n I n t r o d u c t io n t o Z A P
T h e O W A S P Z e d A tta c k P ro x y
Main Feature
A ll t h e e s s e n t ia ls f o r w e b a p p lic a t io n t e s t in g

•

I n t e r c e p t in g P r o x y

•

A c t iv e a n d P a s s iv e S c a n n e r s

•

S p id e r

•

R e p o r t G e n e r a t io n

•

B r u t e F o r c e ( u s in g O W A S P D ir B u s t e r c o d e )

•

F u z z in g ( u s in g O W A S P J B r o F u z z c o d e )
The Additional Features
•

A u t o t a g g in g

•

Po rt sca n n e r

•

Sm a rt ca rd su p p o rt

•

S e s s io n c o m p a r is o n

•

In v o k e e xte rn a l a p p s

•

B e a n S h e ll in t e g r a t io n

•

A P I + H e a d le s s m o d e

•

D y n a m ic S S L C e r t if ic a t e s

•

A n t i C S R F t o k e n h a n d lin g
http://www.nuovoline.com/order.php?do=etc%2Fpasswd
Web Application Hacking
List Tools Scanning and
Enumeration
●

Zap Proxy

●

Arachni

●

W3AF

●

Wapiti

●

OpenVas

●

Nessus

●

Nikto.PL

●

NMAP

●

ShodanHQ
Penetration Testing OS Base on
OSS
●

Backtrack Linux

●

Kali Linux

●

OWASP

●

OSWTF

●

Samurai Linux

●

4n6

●

etc
Common Vulnerability Reference
●

CVE (Common Vulnerability Exposure)

●

OSVDB (Open Source Vulenerability Database)

●

ExploitDB (http://www.exploit-db.com/)

●

National Vulnerability Database

●

Common Vulnerability Scoring System (CVSSSIG) -FIRST

●

CVE Details (http://www.cvedetails.com/)

●

Injector Exploitation Tools

●

Exploit-ID (http://www.exploit-id.com/)
EOF

More Related Content

PPT
Edu614 session 3 presentation tools
PDF
Comprehensive approach to delivering great developer products
PDF
Collaboration between LINE, Microsoft and AI by the developers, for the devel...
PDF
Robotic Process Automation (RPA)_Harvesting a Competitive Advantage
PDF
OPVL Common Mistakes
PPTX
Doctor Appointment App Development Company
PPT
GIS in Natural and Built Environments - Lecture 1
PDF
Python (part 0)
Edu614 session 3 presentation tools
Comprehensive approach to delivering great developer products
Collaboration between LINE, Microsoft and AI by the developers, for the devel...
Robotic Process Automation (RPA)_Harvesting a Competitive Advantage
OPVL Common Mistakes
Doctor Appointment App Development Company
GIS in Natural and Built Environments - Lecture 1
Python (part 0)

Similar to Web Application Hacking (20)

PDF
Transforming developer from Commodity to Premium - A tale of micorservices
PDF
Ninja Correlation of APT Binaries
PDF
Switching horses midstream - From Waterfall to Agile
PDF
The Road to QA
PDF
Information Security Project Management
PPTX
PRESENTATION
PDF
Rajtantra Election Management Services (1).pdf
PDF
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
 
PPTX
SharePoint Saturday Redmond - Building solutions with the future in mind
PDF
CIA For WordPress Developers
PDF
From Content Strategy to Drupal Site Building - Connecting the Dots
PDF
From Content Strategy to Drupal Site Building - Connecting the dots
PDF
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
PPT
Selection
PPTX
Leveraging AI for Content Creation and Optimization
PDF
Offline-first: Making your app resilient to network failures
PDF
Uncover Python's Potential in Machine Learning
PPTX
Yammer time
PPTX
War robot.pptx
PDF
MVP-Style Influencer Programs for Fun & Profit
Transforming developer from Commodity to Premium - A tale of micorservices
Ninja Correlation of APT Binaries
Switching horses midstream - From Waterfall to Agile
The Road to QA
Information Security Project Management
PRESENTATION
Rajtantra Election Management Services (1).pdf
DNX GLOBAL Workshop ★ Katja Andes - Transforming your passion into a valid bu...
 
SharePoint Saturday Redmond - Building solutions with the future in mind
CIA For WordPress Developers
From Content Strategy to Drupal Site Building - Connecting the Dots
From Content Strategy to Drupal Site Building - Connecting the dots
Tailoring Malaysian Blockchain Regulations For Digital Economy 2018 MIGHT
Selection
Leveraging AI for Content Creation and Optimization
Offline-first: Making your app resilient to network failures
Uncover Python's Potential in Machine Learning
Yammer time
War robot.pptx
MVP-Style Influencer Programs for Fun & Profit

More from Muchammad Sholeh (13)

PDF
Roadmap govcsirt versi sholeh
PDF
Ssl presentation verindo_rev_sholeh
PDF
Spreadsheet
PDF
Softwarelegal dirjenaptika-sholeh
PDF
Se legal foss makassar
PDF
Openoffice 3.2.1 presentation
PDF
Ooo writer pendahuluan
PDF
Ooo writer
PDF
IT Government
PDF
Open source Traning at Brebes
ODP
Dss pert1
ODP
Pert1 netprog
PDF
Gov csirt sholeh
Roadmap govcsirt versi sholeh
Ssl presentation verindo_rev_sholeh
Spreadsheet
Softwarelegal dirjenaptika-sholeh
Se legal foss makassar
Openoffice 3.2.1 presentation
Ooo writer pendahuluan
Ooo writer
IT Government
Open source Traning at Brebes
Dss pert1
Pert1 netprog
Gov csirt sholeh

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars

Web Application Hacking

  • 1. Web Application Hacking By Muchammad Sholeh Sharing Knowledge Session, Bank Danamon Lt. 5 KSI
  • 12. A n I n t r o d u c t io n t o Z A P T h e O W A S P Z e d A tta c k P ro x y
  • 13. Main Feature A ll t h e e s s e n t ia ls f o r w e b a p p lic a t io n t e s t in g • I n t e r c e p t in g P r o x y • A c t iv e a n d P a s s iv e S c a n n e r s • S p id e r • R e p o r t G e n e r a t io n • B r u t e F o r c e ( u s in g O W A S P D ir B u s t e r c o d e ) • F u z z in g ( u s in g O W A S P J B r o F u z z c o d e )
  • 14. The Additional Features • A u t o t a g g in g • Po rt sca n n e r • Sm a rt ca rd su p p o rt • S e s s io n c o m p a r is o n • In v o k e e xte rn a l a p p s • B e a n S h e ll in t e g r a t io n • A P I + H e a d le s s m o d e • D y n a m ic S S L C e r t if ic a t e s • A n t i C S R F t o k e n h a n d lin g
  • 17. List Tools Scanning and Enumeration ● Zap Proxy ● Arachni ● W3AF ● Wapiti ● OpenVas ● Nessus ● Nikto.PL ● NMAP ● ShodanHQ
  • 18. Penetration Testing OS Base on OSS ● Backtrack Linux ● Kali Linux ● OWASP ● OSWTF ● Samurai Linux ● 4n6 ● etc
  • 19. Common Vulnerability Reference ● CVE (Common Vulnerability Exposure) ● OSVDB (Open Source Vulenerability Database) ● ExploitDB (http://www.exploit-db.com/) ● National Vulnerability Database ● Common Vulnerability Scoring System (CVSSSIG) -FIRST ● CVE Details (http://www.cvedetails.com/) ● Injector Exploitation Tools ● Exploit-ID (http://www.exploit-id.com/)
  • 20. EOF