SlideShare a Scribd company logo
CEH v11
Web Application Hacking
DOMAIN 5
www.infosectrain.com
www.infosectrain.com | sales@infosectrain.com 01
Domains of CEH
DOMAIN 1
Information Security &
Ethical Hacking Overview
DOMAIN 2
Reconnaissance
Techniques
DOMAIN 3
System hacking
phases
& Attack Techniques
DOMAIN 4
Network and perimeter
hacking
DOMAIN 5
Web application hacking
DOMAIN 6
Wireless network hacking
DOMAIN 7
Mobile platform, IoT,
& OT hacking
DOMAIN 8
Cloud Computing
DOMAIN 9
Cryptography
CEH v11
DOMAINS
6%
21%
17%
14%
16%
6%
8%
6%
6%
What is a Web Application?
Considering that most people have used mobile applications like PUB-G,
Instagram, and WhatsApp. I will give you an example of a web application that
is also a mobile app. Now assume you’ve lost your mobile or your mobile is
switched off, and you are willing to scroll the insta feed. What will you do? Login
to your account through Google Chrome. Right? And that’s it, as you can use
your Instagram by using a web browser. It is called a web application. A few
famous examples of web applications are Facebook, MakeMyTrip, Flipboard,
and the 2048 Game.
The technical definition of a Web Application
A web application is a software or a program that performs particular tasks by
running on any web browser like Google Chrome, Mozilla Firefox, Internet
Explorer, etc.
www.infosectrain.com | sales@infosectrain.com 02
DOMAIN 5
Web Application Hacking
In this blog, we will discuss the 5th
domain of CEH,
which is ‘Web Application Hacking’
www.infosectrain.com | sales@infosectrain.com 03
DOMAIN 5
Web Application Hacking
Hacking of Web Applications
Web hacking refers to exploiting HTTP applications by manipulating graphics,
altering the Uniform Resource Identifier (URI), or altering HTTP elements
outside the URI.
Different methods to hack web applications are:
> SQL Injection attacks
> Cross-site scripting
> Fuzzing
One of the coolest things about using web applications is you
don’t need to download them. Hence, devices will have space for
more important data.
www.infosectrain.com | sales@infosectrain.com 04
DOMAIN 5
Web Application Hacking
SQL Injection Attacks
We can use Structured Query Language to operate, query, and administrate
the data systems. The SQL injection attack is one of the prevalent SQL attacks
that attackers use to read, change, or delete data. SQL injections can also
command the operating systems to perform particular tasks.
www.infosectrain.com | sales@infosectrain.com 05
DOMAIN 5
Web Application Hacking
Cross-site Scripting
Attacks using cross-site scripting, also called XSS, involve injecting malicious
code into websites that would otherwise be safe. Using a target web
application vulnerability, an attacker can send malicious code to a user.
www.infosectrain.com | sales@infosectrain.com 06
DOMAIN 5
Web Application Hacking
Fuzzing
In software, operating systems, or networks, developers can employ fuzz
testing to identify code mistakes and security gaps. Attackers may also apply
the same method on our sites or servers to locate weaknesses.
It works by first entering a huge amount of random data (fuzz) to crash it.
Furthermore, attackers use a fuzzer software tool that is used to detect weak
areas. If the security of the target fails, the attacker might exploit it further.
www.infosectrain.com | sales@infosectrain.com 07
DOMAIN 5
Web Application Hacking
Unvalidated Inputs
Web applications accept input from the user, as queries are built on top of
that input. The attacker can launch attacks like cross-site scripting (XSS), SQL
injection attacks, and directory traversal attacks if these inputs are not
properly sanitized. This attack can also lead to identity theft and data theft.
Directory Traversal Attack
As a result of this vulnerability, the attacker can access restricted directories
on the web server in addition to the webroot directory. This would allow the
attacker to access system files, run OS commands, and find out details about
the configuration.
Defense Mechanisms
There are various defense mechanisms to control web application hacking.
Some of them are:
> Authentication
> Handling data safely
> Conducting audits
Types of vulnerabilities that cause
Web Application Hacking
www.infosectrain.com | sales@infosectrain.com 08
DOMAIN 5
Web Application Hacking
Authentication
Authentication is a defense mechanism that checks the user ID and password
to verify the users. But with the increasing social engineering techniques,
attackers can easily get your login credentials. Hence, the two-step
verification came into existence.
Two-step verification is nothing but sending a “One Time Password” to your
mobile so that only you can have the authority to login into your account
www.infosectrain.com | sales@infosectrain.com 09
Handling data safely
Most vulnerabilities in Web applications are caused by the improper
processing of user data. Vulnerabilities can frequently be overlooked, not by
verifying the input itself but by assuring safe processing. Secure Coding
approach that prevents typical issues. For example, the proper use of
parameterized database access queries can avoid attacks from SQL by
injecting.
DOMAIN 5
Web Application Hacking
www.infosectrain.com | sales@infosectrain.com 10
Conducting Audits
Effective audit logs should enable the application’s owners to understand
precisely what has happened, what vulnerability was exploited by attackers,
whether attackers got unwanted data access, or whether attackers
conducted any unauthorized actions. Audits can also provide the attacker’s
identity.
DOMAIN 5
Web Application Hacking
www.infosectrain.com | sales@infosectrain.com

More Related Content

PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
PPTX
Web server security challenges
PPTX
Access Controls Attacks
PDF
NormShield 2018 Cyber Security Risk Brief
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PPTX
Access control attacks by Yaakub bin Idris
PPTX
Cyber security
Domain 4 of CEH V11: Network and Perimeter Hacking
Web server security challenges
Access Controls Attacks
NormShield 2018 Cyber Security Risk Brief
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Access control attacks by Yaakub bin Idris
Cyber security

What's hot (20)

PPTX
Overview on hacking tools
PPT
Ch03 Network and Computer Attacks
PPTX
Different types of attacks in internet
PPT
Aiman
PPTX
2011 training presentation
PPTX
Introduction to Information security
PPT
P R I V A C Y!!!
PPTX
Internet security
PDF
Web Server Security Guidelines
PPT
Introduction to Web Server Security
PDF
Cyber Security Analytics – The Weapon to Fight Cyber Crime
PDF
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
PPTX
Hacking- Ethical/ Non-ethical, Cyber Security.
PPT
Types of attacks and threads
PPTX
2 2 the dangers of computer crime
PPTX
Communication security 2021
PDF
Email Security Overview
PPTX
We are all info sec
PPTX
Introduction to Cyber Security | Malware | Phishing attacks
PPTX
What's new in​ CEHv11?
Overview on hacking tools
Ch03 Network and Computer Attacks
Different types of attacks in internet
Aiman
2011 training presentation
Introduction to Information security
P R I V A C Y!!!
Internet security
Web Server Security Guidelines
Introduction to Web Server Security
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Hacking- Ethical/ Non-ethical, Cyber Security.
Types of attacks and threads
2 2 the dangers of computer crime
Communication security 2021
Email Security Overview
We are all info sec
Introduction to Cyber Security | Malware | Phishing attacks
What's new in​ CEHv11?

Similar to Domain 5 of the CEH: Web Application Hacking (20)

PPTX
Domain 5 of the CEH Web Application Hacking.pptx
DOCX
Unit 5 Web Application and Hacking Techniques.docx
PDF
How Can I Reduce The Risk Of A Cyber-Attack?
PDF
Top Application Security Threats
PDF
Web App Security: Top Threats and How to Protect Your App.pdf
PPTX
Web and Mobile Application Security
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
PDF
Are you fighting_new_threats_with_old_weapons
PPTX
Security risks awareness
PDF
cyber security
PDF
Application security testing an integrated approach
PDF
Web Application Security Testing Guide | Secure Web Apps
PPTX
BDSE03-1121-API-PresentationTemplate.pptx
DOCX
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
PPTX
Computer security system Unit1.pptx
PPTX
CyberSecurityppt. pptx
PDF
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
PPTX
Web_Appication_Security_Training_For_Developers.pptx
DOCX
Analysis of web application penetration testing
PDF
Secure coding guidelines
Domain 5 of the CEH Web Application Hacking.pptx
Unit 5 Web Application and Hacking Techniques.docx
How Can I Reduce The Risk Of A Cyber-Attack?
Top Application Security Threats
Web App Security: Top Threats and How to Protect Your App.pdf
Web and Mobile Application Security
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Are you fighting_new_threats_with_old_weapons
Security risks awareness
cyber security
Application security testing an integrated approach
Web Application Security Testing Guide | Secure Web Apps
BDSE03-1121-API-PresentationTemplate.pptx
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Computer security system Unit1.pptx
CyberSecurityppt. pptx
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Web_Appication_Security_Training_For_Developers.pptx
Analysis of web application penetration testing
Secure coding guidelines

More from ShivamSharma909 (20)

PDF
Ethical Hacking Interview Questions and Answers.pdf
PDF
CYBERSECURITY Interview Questions for Freshers.pdf
PDF
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
PDF
Top 20 Incident Responder Interview Questions and Answers (1).pdf
PDF
Top 25 Azure Architect Interview Questions and Answers.pdf
PDF
Top 20 Azure Administrator Interview Questions.pdf
PDF
Threat Hunting Professional Online Training Course
PDF
Why cloud security engineers find CCSE as a perfect fit
PDF
Top 20 certified ethical hacker interview questions and answer
PDF
Top 20 azure interview questions
PDF
Top 15 aws security interview questions
PDF
EC-Council Certified SOC Analyst
PDF
Ctia course outline
PDF
Domain 6 of CEH: Wireless Network Hacking
PDF
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
PDF
Domain 2 of CEH v11: Reconnaissance Techniques
PDF
Domain 1 of CEH v11: Information Security and Ethical Hacking
PDF
How is az 303 different from az-304
PDF
The importance of understanding the global cybersecurity index
PDF
Cisa domain 4
Ethical Hacking Interview Questions and Answers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 20 Azure Administrator Interview Questions.pdf
Threat Hunting Professional Online Training Course
Why cloud security engineers find CCSE as a perfect fit
Top 20 certified ethical hacker interview questions and answer
Top 20 azure interview questions
Top 15 aws security interview questions
EC-Council Certified SOC Analyst
Ctia course outline
Domain 6 of CEH: Wireless Network Hacking
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 1 of CEH v11: Information Security and Ethical Hacking
How is az 303 different from az-304
The importance of understanding the global cybersecurity index
Cisa domain 4

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Basic Mud Logging Guide for educational purpose
PDF
Computing-Curriculum for Schools in Ghana
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Complications of Minimal Access Surgery at WLH
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Supply Chain Operations Speaking Notes -ICLT Program
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
TR - Agricultural Crops Production NC III.pdf
Anesthesia in Laparoscopic Surgery in India
Basic Mud Logging Guide for educational purpose
Computing-Curriculum for Schools in Ghana
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPH.pptx obstetrics and gynecology in nursing
Complications of Minimal Access Surgery at WLH
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025

Domain 5 of the CEH: Web Application Hacking

  • 1. CEH v11 Web Application Hacking DOMAIN 5 www.infosectrain.com
  • 2. www.infosectrain.com | sales@infosectrain.com 01 Domains of CEH DOMAIN 1 Information Security & Ethical Hacking Overview DOMAIN 2 Reconnaissance Techniques DOMAIN 3 System hacking phases & Attack Techniques DOMAIN 4 Network and perimeter hacking DOMAIN 5 Web application hacking DOMAIN 6 Wireless network hacking DOMAIN 7 Mobile platform, IoT, & OT hacking DOMAIN 8 Cloud Computing DOMAIN 9 Cryptography CEH v11 DOMAINS 6% 21% 17% 14% 16% 6% 8% 6% 6%
  • 3. What is a Web Application? Considering that most people have used mobile applications like PUB-G, Instagram, and WhatsApp. I will give you an example of a web application that is also a mobile app. Now assume you’ve lost your mobile or your mobile is switched off, and you are willing to scroll the insta feed. What will you do? Login to your account through Google Chrome. Right? And that’s it, as you can use your Instagram by using a web browser. It is called a web application. A few famous examples of web applications are Facebook, MakeMyTrip, Flipboard, and the 2048 Game. The technical definition of a Web Application A web application is a software or a program that performs particular tasks by running on any web browser like Google Chrome, Mozilla Firefox, Internet Explorer, etc. www.infosectrain.com | sales@infosectrain.com 02 DOMAIN 5 Web Application Hacking In this blog, we will discuss the 5th domain of CEH, which is ‘Web Application Hacking’
  • 4. www.infosectrain.com | sales@infosectrain.com 03 DOMAIN 5 Web Application Hacking Hacking of Web Applications Web hacking refers to exploiting HTTP applications by manipulating graphics, altering the Uniform Resource Identifier (URI), or altering HTTP elements outside the URI. Different methods to hack web applications are: > SQL Injection attacks > Cross-site scripting > Fuzzing One of the coolest things about using web applications is you don’t need to download them. Hence, devices will have space for more important data.
  • 5. www.infosectrain.com | sales@infosectrain.com 04 DOMAIN 5 Web Application Hacking SQL Injection Attacks We can use Structured Query Language to operate, query, and administrate the data systems. The SQL injection attack is one of the prevalent SQL attacks that attackers use to read, change, or delete data. SQL injections can also command the operating systems to perform particular tasks.
  • 6. www.infosectrain.com | sales@infosectrain.com 05 DOMAIN 5 Web Application Hacking Cross-site Scripting Attacks using cross-site scripting, also called XSS, involve injecting malicious code into websites that would otherwise be safe. Using a target web application vulnerability, an attacker can send malicious code to a user.
  • 7. www.infosectrain.com | sales@infosectrain.com 06 DOMAIN 5 Web Application Hacking Fuzzing In software, operating systems, or networks, developers can employ fuzz testing to identify code mistakes and security gaps. Attackers may also apply the same method on our sites or servers to locate weaknesses. It works by first entering a huge amount of random data (fuzz) to crash it. Furthermore, attackers use a fuzzer software tool that is used to detect weak areas. If the security of the target fails, the attacker might exploit it further.
  • 8. www.infosectrain.com | sales@infosectrain.com 07 DOMAIN 5 Web Application Hacking Unvalidated Inputs Web applications accept input from the user, as queries are built on top of that input. The attacker can launch attacks like cross-site scripting (XSS), SQL injection attacks, and directory traversal attacks if these inputs are not properly sanitized. This attack can also lead to identity theft and data theft. Directory Traversal Attack As a result of this vulnerability, the attacker can access restricted directories on the web server in addition to the webroot directory. This would allow the attacker to access system files, run OS commands, and find out details about the configuration. Defense Mechanisms There are various defense mechanisms to control web application hacking. Some of them are: > Authentication > Handling data safely > Conducting audits Types of vulnerabilities that cause Web Application Hacking
  • 9. www.infosectrain.com | sales@infosectrain.com 08 DOMAIN 5 Web Application Hacking Authentication Authentication is a defense mechanism that checks the user ID and password to verify the users. But with the increasing social engineering techniques, attackers can easily get your login credentials. Hence, the two-step verification came into existence. Two-step verification is nothing but sending a “One Time Password” to your mobile so that only you can have the authority to login into your account
  • 10. www.infosectrain.com | sales@infosectrain.com 09 Handling data safely Most vulnerabilities in Web applications are caused by the improper processing of user data. Vulnerabilities can frequently be overlooked, not by verifying the input itself but by assuring safe processing. Secure Coding approach that prevents typical issues. For example, the proper use of parameterized database access queries can avoid attacks from SQL by injecting. DOMAIN 5 Web Application Hacking
  • 11. www.infosectrain.com | sales@infosectrain.com 10 Conducting Audits Effective audit logs should enable the application’s owners to understand precisely what has happened, what vulnerability was exploited by attackers, whether attackers got unwanted data access, or whether attackers conducted any unauthorized actions. Audits can also provide the attacker’s identity. DOMAIN 5 Web Application Hacking