SlideShare a Scribd company logo
Web Application Penetration Testing
Webinar
Who am i
I’m C Vishwanath [Certified Ethical Hacker]
Senior Operational Professional in IBM
Cyber Security Researcher and Trainer
Founder of E-hacking4all
My Blog: www.e-hacking4all.blogspot.in
Contact: Google my Name 
Basics of Hacking
Introduction to Penetration Testing
Foot printing
Scanning
Live Practical's
Topics Cover in Session
The Process of attempting to gain successfully,
unauthorized access to computer resources for the
purpose of help or secure system is called Hacking.
What Is Hacking
Hacker:
• Access computer system or network without authorization
• Breaks the law
 Ethical Hacker:
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
Hacking v/s Ethical Hacking
Foot printing
Scanning
Enumeration
Attack and Gaining
Access
Escalating Privilege,
Covering Tracks and
Creating Backdoors
Hacking Life Cycle
Web Application Penetration Testing
The primary objective behind a web application penetration test (WAPT) is to
identify exploitable vulnerabilities, weaknesses and technical flaws in
applications before attackers are able to discover and exploit them. Web
application penetration testing reveals real-world opportunities attackers
could use to compromise applications in order to gain access to sensitive
data or even take-over systems for malicious and non-business purposes.
Penetration Testing
Penetration 
Testing
Black Box 
Testing
White Box 
Testing
Grey Box 
Testing
The Tester has no prior 
knowledge of the system he 
is to test
The Tester has complete 
information that the tester 
needs to perform the test is 
provided to him
The Tester has partial 
knowledge of the system is 
provided to the tester. This is 
taken as an attack by an 
external hacker 
Types of Penetration TestingTypes of Penetration TestingTypes of Penetration Testing
The security testing methodology that we follow to minimize the risk of security
breaches and improve the security stature of your applications is by utilizing a
series of signature tools and techniques, will attempt to breach your application
systems through test techniques that are manually executed
Steps in Penetration Testing
• Foot Printing is a process of collecting as much information as
possible about target, for identifying various ways to intrude in to
organization network system
• Attackers gather publicly available sensitive information
• Sources:
Whois.domain
Netcraft
Google hacking ( sensitive Information Gathering)
OSIntframework
Foot Printing
• Network Scanning refers to set of procedures for identfying hosts,
ports, and service in network
• Objectives of Scanning:
 To Discover live hosts, ipaddress, & openports
 Discover operating system and system Architecture
 Services running on host
Source :
 Nmap Tool
 Shodan.io
Scanning
Web Application Penetration Testing
Web Application Breach the Perimeter
Internet DMZ
Trusted
Inside
Corporate
Inside
HTTP(S)
Allows HTTP port 80
Allows HTTPS port 443
Firewall only
allows
applications
on the web
server to talk to
application
server.
Firewall only allows 
application server to 
talk to database 
server.
IIS
SunOne
Apache
ASP
.NET
WebSphere
Java
SQL
Oracle
DB2
Browser
Bypass Authentication
Sql Injection
Cross Site Scripting
File Upload Vulnerability
Practical on Live Hacking
 Authentication bypass vulnerability could allow attackers to perform
various malicious operations by bypassing the device authentication
mechanism.
What's the issue - Authentication bypass exploit is mainly due to a
weak authentication mechanism.
Bypass Authentication
Countermeasures for Bypass Authentication:
1. In order to stay protected from authentication bypass attack, it is
best to keep all your systems, applications, software and OS up-to-
date.
2. It is suggested to not expose authentication protocol in the client-
side web browser script.
3. They suggest ensuring that user session IDs and cookies are
encrypted.
4. It is recommended to validate all user input on the server side.
Bypass Authentication
 SQL injection is a web security vulnerability that allows an attacker
to interfere with the queries that an application makes to its
database. It generally allows an attacker to view data that they are
not normally able to retrieve. This might include data belonging to
other users, or any other data that the application itself is able to
access. In many cases, an attacker can modify or delete this data,
causing persistent changes to the application's content or behavior.
Sql Injection
Countermeasures for Sql Injection:
1. Source Code Review
2. Sanitizing and validating the input field
3. Checking the privileges of a user’s connection to the database
4. Apply least privilege rule to run the application that access
database (Generally we run with admin privileges by default which
is not advisable)
5. Use IDS and IPS. I would suggest Snort (IDS- Intrusion prevention
system, IPS- Intrusion prevention system)
Sql Injection
Cross-site Scripting (XSS) is a client-side code injection attack. The
attacker aims to execute malicious scripts in a web browser of the
victim by including malicious code in a legitimate web page or web
application. The actual attack occurs when the victim visits the web
page or web application that executes the malicious code.
Cross Site Scripting Vulnerability
There are two stages to a typical XSS attack:
 To run malicious JavaScript code in a victim’s browser, an attacker
must first find a way to inject malicious code (payload) into a web
page that the victim visits.
 After that, the victim must visit the web page with the malicious
code. If the attack is directed at particular victims, the attacker can
use social engineering and/or phishing to send a malicious URL to
the victim.
How Cross-site Scripting Works
Countermeasures for Cross site Scripting:
1. Don’t trust any user input
2. Use escaping/encoding
3. Sanitize HTML
4. Set the HttpOnly flag
5. Use a Content Security Policy
Cross-site Scripting
 Uploaded files represent a significant risk to applications. The first
step in many attacks is to get some code to the system to be
attacked. Then the attack only needs to find a way to get the code
executed. Using a file upload helps the attacker accomplish the first
step.
File Upload Vulnerability
Counter measures for File upload Vulnerability:
1. Only allow specific file types– By limiting the list of allowed file
types
2. Verify file types – In addition to restricting the file types, it is
important to ensure that no files are ‘masking’ as allowed file
types.
3. Scan for malware – To minimize risk, all files should be scanned
for malware.
4. Use simple error messages – When displaying file upload errors,
do not include directory paths, server configuration settings
File Upload Vulnerability
Incorporating security into
lifecycle
Integrate security into application
requirements
Including information security
professionals in software
architecture/design review
Security APIs & libraries (e.g. ESAPI,
Validate, etc.) when possible
Threat modeling
Web application vulnerability
assessment tools
How to Secure Web Applications
Q&A

More Related Content

PDF
Introduction to Web Application Penetration Testing
PPTX
Barriers Of Communication
PPT
Introduction to Web Application Penetration Testing
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
Vulnerabilities in modern web applications
PPT
Intro to Web Application Security
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Introduction to Web Application Penetration Testing
Barriers Of Communication
Introduction to Web Application Penetration Testing
OWASP Top 10 Web Application Vulnerabilities
Introduction To Vulnerability Assessment & Penetration Testing
Vulnerabilities in modern web applications
Intro to Web Application Security
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...

What's hot (20)

PDF
Footprinting
PPT
Application Security
PPT
Web Application Security Testing
PPTX
Penetration testing reporting and methodology
PDF
Web application security & Testing
PDF
Secure code
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Web Application Penetration Testing Introduction
PPTX
Introduction to penetration testing
PDF
Penetration testing web application web application (in) security
PDF
Penetration testing
PPTX
Web application security
ODP
OWASP Secure Coding
PPTX
PPT
Web Application Security
PPTX
Secure coding practices
PPTX
Penetration Testing
PDF
Cybersecurity Basics - Aravindr.com
PDF
Penetration testing & Ethical Hacking
Footprinting
Application Security
Web Application Security Testing
Penetration testing reporting and methodology
Web application security & Testing
Secure code
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Web Application Penetration Testing Introduction
Introduction to penetration testing
Penetration testing web application web application (in) security
Penetration testing
Web application security
OWASP Secure Coding
Web Application Security
Secure coding practices
Penetration Testing
Cybersecurity Basics - Aravindr.com
Penetration testing & Ethical Hacking
Ad

Similar to Web Application Penetration Testing (20)

PPTX
Security Testing Training With Examples
PDF
Security Testing Approach for Web Application Testing.pdf
PPT
Security Testing
PDF
Introduction to Ethical Hacking pdf file
PPTX
Computer security system Unit1.pptx
DOCX
Unit 5 Web Application and Hacking Techniques.docx
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
PDF
Top 20 certified ethical hacker interview questions and answer
PDF
What is ethical hacking and complete cyber security presentation on this file
PPTX
Ethical Hacking justvamshi .pptx
PPT
DEVSECOPS_the_beginning.ppt
PPT
Andrews whitakrer lecture18-security.ppt
PPTX
Domain 5 of the CEH Web Application Hacking.pptx
PPTX
Web and Mobile Application Security
PDF
Jonathan Singer - Wheezing The Juice.pdf
PDF
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
PDF
Secure coding guidelines
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
PPTX
HACKERS ATTACK PROCESS
PPTX
Security testing
Security Testing Training With Examples
Security Testing Approach for Web Application Testing.pdf
Security Testing
Introduction to Ethical Hacking pdf file
Computer security system Unit1.pptx
Unit 5 Web Application and Hacking Techniques.docx
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Top 20 certified ethical hacker interview questions and answer
What is ethical hacking and complete cyber security presentation on this file
Ethical Hacking justvamshi .pptx
DEVSECOPS_the_beginning.ppt
Andrews whitakrer lecture18-security.ppt
Domain 5 of the CEH Web Application Hacking.pptx
Web and Mobile Application Security
Jonathan Singer - Wheezing The Juice.pdf
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Secure coding guidelines
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
HACKERS ATTACK PROCESS
Security testing
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
GamePlan Trading System Review: Professional Trader's Honest Take
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
The AUB Centre for AI in Media Proposal.docx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
The Rise and Fall of 3GPP – Time for a Sabbatical?
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm

Web Application Penetration Testing

  • 1. Web Application Penetration Testing Webinar
  • 2. Who am i I’m C Vishwanath [Certified Ethical Hacker] Senior Operational Professional in IBM Cyber Security Researcher and Trainer Founder of E-hacking4all My Blog: www.e-hacking4all.blogspot.in Contact: Google my Name 
  • 3. Basics of Hacking Introduction to Penetration Testing Foot printing Scanning Live Practical's Topics Cover in Session
  • 4. The Process of attempting to gain successfully, unauthorized access to computer resources for the purpose of help or secure system is called Hacking. What Is Hacking
  • 5. Hacker: • Access computer system or network without authorization • Breaks the law  Ethical Hacker: • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests Hacking v/s Ethical Hacking
  • 6. Foot printing Scanning Enumeration Attack and Gaining Access Escalating Privilege, Covering Tracks and Creating Backdoors Hacking Life Cycle
  • 7. Web Application Penetration Testing The primary objective behind a web application penetration test (WAPT) is to identify exploitable vulnerabilities, weaknesses and technical flaws in applications before attackers are able to discover and exploit them. Web application penetration testing reveals real-world opportunities attackers could use to compromise applications in order to gain access to sensitive data or even take-over systems for malicious and non-business purposes. Penetration Testing
  • 9. The security testing methodology that we follow to minimize the risk of security breaches and improve the security stature of your applications is by utilizing a series of signature tools and techniques, will attempt to breach your application systems through test techniques that are manually executed Steps in Penetration Testing
  • 10. • Foot Printing is a process of collecting as much information as possible about target, for identifying various ways to intrude in to organization network system • Attackers gather publicly available sensitive information • Sources: Whois.domain Netcraft Google hacking ( sensitive Information Gathering) OSIntframework Foot Printing
  • 11. • Network Scanning refers to set of procedures for identfying hosts, ports, and service in network • Objectives of Scanning:  To Discover live hosts, ipaddress, & openports  Discover operating system and system Architecture  Services running on host Source :  Nmap Tool  Shodan.io Scanning
  • 13. Web Application Breach the Perimeter Internet DMZ Trusted Inside Corporate Inside HTTP(S) Allows HTTP port 80 Allows HTTPS port 443 Firewall only allows applications on the web server to talk to application server. Firewall only allows  application server to  talk to database  server. IIS SunOne Apache ASP .NET WebSphere Java SQL Oracle DB2 Browser
  • 14. Bypass Authentication Sql Injection Cross Site Scripting File Upload Vulnerability Practical on Live Hacking
  • 15.  Authentication bypass vulnerability could allow attackers to perform various malicious operations by bypassing the device authentication mechanism. What's the issue - Authentication bypass exploit is mainly due to a weak authentication mechanism. Bypass Authentication
  • 16. Countermeasures for Bypass Authentication: 1. In order to stay protected from authentication bypass attack, it is best to keep all your systems, applications, software and OS up-to- date. 2. It is suggested to not expose authentication protocol in the client- side web browser script. 3. They suggest ensuring that user session IDs and cookies are encrypted. 4. It is recommended to validate all user input on the server side. Bypass Authentication
  • 17.  SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. Sql Injection
  • 18. Countermeasures for Sql Injection: 1. Source Code Review 2. Sanitizing and validating the input field 3. Checking the privileges of a user’s connection to the database 4. Apply least privilege rule to run the application that access database (Generally we run with admin privileges by default which is not advisable) 5. Use IDS and IPS. I would suggest Snort (IDS- Intrusion prevention system, IPS- Intrusion prevention system) Sql Injection
  • 19. Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. Cross Site Scripting Vulnerability
  • 20. There are two stages to a typical XSS attack:  To run malicious JavaScript code in a victim’s browser, an attacker must first find a way to inject malicious code (payload) into a web page that the victim visits.  After that, the victim must visit the web page with the malicious code. If the attack is directed at particular victims, the attacker can use social engineering and/or phishing to send a malicious URL to the victim. How Cross-site Scripting Works
  • 21. Countermeasures for Cross site Scripting: 1. Don’t trust any user input 2. Use escaping/encoding 3. Sanitize HTML 4. Set the HttpOnly flag 5. Use a Content Security Policy Cross-site Scripting
  • 22.  Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then the attack only needs to find a way to get the code executed. Using a file upload helps the attacker accomplish the first step. File Upload Vulnerability
  • 23. Counter measures for File upload Vulnerability: 1. Only allow specific file types– By limiting the list of allowed file types 2. Verify file types – In addition to restricting the file types, it is important to ensure that no files are ‘masking’ as allowed file types. 3. Scan for malware – To minimize risk, all files should be scanned for malware. 4. Use simple error messages – When displaying file upload errors, do not include directory paths, server configuration settings File Upload Vulnerability
  • 24. Incorporating security into lifecycle Integrate security into application requirements Including information security professionals in software architecture/design review Security APIs & libraries (e.g. ESAPI, Validate, etc.) when possible Threat modeling Web application vulnerability assessment tools How to Secure Web Applications
  • 25. Q&A