Index.md - jlareaux/sec542-study-guide GitHub Wiki
SEC542 Index
Index of terms in the SEC542 course. This index is exhaustive and references over 99% of the pages the course material.
Legend:
β Term
### AJAX
β’ Overview - b *3* p *130-140*
β’ Introduction - b *4* p *130*
β’ Attack Surface - b *4* p *138*
β°β΄Context β°β΄Book β°β΄Page(s)
The Overview and Introduction contexts have special meaning and appear at the top of the list of references to a term first in a term's references. Other references to a term appear after these, alphabetically by context.
Overview: list of pages which a reference a term. Introduction: list of pages which reference fundamental concepts of a term.
Table of Contents
- AJAX
- API Attacks
- Authentication
- BBQSQL
- BeEf
- Burp
- Bypass Flaws
- CeWL
- Command Injection
- Cross-Site Request Forgery
- Cross-Site Scripting
- CSRF
- Data Attacks
- dig
- Directory Browsing
- Directory Traversal
- Document Object Model
- DNS
- DNSRecon
- DOM
- Drupal
- Exercises
- Fiddler
- File Inclusion
- FOCA
- FuzzDB
- Fuzzing
- Heartbleed
- HTTP
- HTTPS
- Information Leakage
- Interception Proxies
- JavaScript
- JSON
- Logic Attacks
- Maltego
- Metasploit
- Mutillidae
- Netcat
- Netcraft
- Nikto
- Nmap
- NsLookup
- Open Source Information
- OpenSSL
- OTG
- OWASP Testing Guide
- PTR Record/Scan
- Python
- Qualys
- Query String Formats
- Recon-ng
- Reporting
- Robots
- Search Engines
- Server
- Sessions
- Shellshock
- Shodan
- Spidering
- SQL
- SQL Injection
- sqlmap
- SSL/TSL
- theHarvester
- Tools
- URI
- w3af
- Wget
- User-Agent
- Username Harvesting
- Web
- Web App Pen Testing
- Wappalyzer
- WebSocket
- WHOIS
- WPScan
- XSS
- XSScrapy
- XSSer
- xsssniper
- ZAP
AJAX
- Overview - b 3 p 130-140
- Introduction - b 4 p 130
- Attack Surface - b 4 p 138
- Exploitation - b 4 p 140
- Mapping - b 4 p 139
- Mash-Ups - b 4 p 134
- Mash-Up Proxy Features - b 4 p 136
- Mash-Up Proxy Issues - b 4 p 137
- Same Origin - b 4 p 135
- XMLHttpRequest - b 4 p 131
- Example - b 4 p 133
- readyState - b 4 p 132
API Attacks
- Overview - b 4 p 141-146
Authentication
- Overview - b 2 p 133-153
- Introduction - b 2 p 133
- Forms-based Authentication - b 2 p 142
- Attacker's Perspective of, - b 2 p 145
- Illustrated - b 2 p 144
- Pieces of, - b 2 p 143
- HTTP Basic Authentication - b 2 p 134
- Attacker's Perspective of, - b 2 p 136
- Illustrated - b 2 p 135
- HTTP Digest Authentication - b 2 p 137
- Attacker's Perspective of, - b 2 p 139
- Illustrated - b 2 p 138
- Integrated Windows Authentication - b 2 p 140
- Attacker's Perspective of, - b 2 p 141
- OAuth - b 2 p 146
- Attacker's Perspective of, - b 2 p 153
- Example Requests - b 2 p 152
- How OAuth Works - b 2 p 147-149
- OAuth 1.0 - b 2 p 150
- OAuth 2.0 - b 2 p 151
BBQSQL
- Overview - b 3 p 152
BeEf
- Overview - b 4 p 107-115
- Introduction - b 4 p 107
- Browser Exploitation - b 4 p 114
- Functionality - b 4 p 110
- History Browsing - b 4 p 111
- Interface - b 4 p 108
- interprotocol Exploitation - b 4 p 115
- Port Scanning - b 4 p 113
- Request Initiation - b 4 p 112
- Zombie Control - b 4 p 109
Burp
- Overview - b 1 p 38-51
- Introduction - b 1 p 38-39
- Automated Spidering - b 2 p 62
- Components - b 1 p 39
- Comparer - b 1 p 51
- Decoder - b 1 p 50
- Intruder - b 1 p 47
- Fuzzing - b 2 p 94
- Reflection Tests - b 4 p 64
- Repeater - b 1 p 48
- Sequencer - b 1 p 49
- Session Analysis - b 3 p 20
- Spider - b 1 p 46
- Proxy - b 1 p 43
- Options - b 1 p 44
- Scope - b 1 p 42
- Target - b 1 p 40
- Filtering - b 1 p 41
- Web Interface - b 1 p 45
- Index: sqlmap > Riding ZAP/Burp Sessions
Bypass Flaws
- Authentication Bypass - b 3 p 25
- Bypass Methods - b 3 p 26
CeWL
- Overview - b 2 p 64
Command Injection
- Overview - b 3 p 41-44
- Index: Shellshock
Cross-Site Request Forgery
- Index: CSRF
Cross-Site Scripting
- Index: XSS
CSRF
- Overview - b 5 p 6-13
- Introduction - b 5 p 7-10
- Attacking CSRF - b 5 p 12
- Detecting CSRF - b 5 p 11
- Index: ZAP > CSRF Test Forms
Data Attacks
- Overview - b 4 p 148-154
- Index: JSON
dig
- Overview - b 1 p 62-63
Directory Browsing
- Overview - b 2 p 111-114
- Introduction - b 2 p 111
- Automated Discovery of, - b 2 p 114
- Index: FuzzDB
- Index: Metasploit
- Index: Nikto
- Index: w3af
- Index: ZAP > Forced Browse
- Google Searching for, - b 2 p 112
Directory Traversal
- Index: File Inclusion
Document Object Model
- Index: DOM
DNS
- Overview - b 1 p 55-60
- Introduction - b 1 p 55
- Brute Force Scans - b 1 p 59
- Reconnaissance Tools - b 1 p 60
- Index: nslookup
- Index: dig
- Index: Nmap > NSE Scripts > DNS
- Index: DNSRecon
- Index: Metasploit > Modules > DNS
- Reverse DNS Scan - b 1 p 58
- Zone Transfers - b 1 p 56-57
DNSRecon
- Overview - b 1 p 65-66
DOM
- Overview - b 4 p 17-22
- Interacting with Cookies - b 4 p 22
Drupal
- Overview - b 5 p 112-116
- Drupalgeddon - b 5 p 113-115
- Index: Metasploit > Exploiting Drupalgeddon
Exercises
- AJAX XSS - b 4 p 155-173
- Authentication - b 2 p 154-173
- Authentication Bypass - b 2 p 27-32
- BeEf - b 4 p 116-128
- Burp Fuzzing - b 2 p 97-106
- Command Injection - b 2 p 45-55
- CSRF - b 2 p 14-25
- Directory Browsing - b 2 p 115-131
- DNS Harvesting - b 1 p 68-77
- Error-Based SQLi - b 2 p 118-127
- Examining HTTP Requests and Responses - b 1 p 133-141
- Exploiting Heartbleed - b 1 p 164-173
- Gathering Server Info - b 2 p 15-18
- HTML Injection - b 4 p 75-95
- JavaScript - b 4 p 23-31
- Local/Remote File Inclusion - b 2 p 65-77
- Metasploit - b 2 p 117-125
- Mobile MITM - b 2 p 30-45
- Python - b 2 p 58-64
- Reflective XSS - b 4 p 48-53
- Shellshock - b 2 p 38-49
- Spidering - b 2 p 65-75
- sqlmap + ZAP - b 2 p 167-182
- Testing HTTPS - b 1 p 153-157
- Username Harvesting - b 2 p 184-201
- w3af - b 2 p 93-100
- When Tools Fail - b 2 p 133-144
- WPScan - b 2 p 68-78
- ZAP Forced Browse - b 2 p 82-89
Fiddler
- Overview - b 1 p 33-34
File Inclusion
- Overview - b 3 p 57-64
- Building Blocks - b 3 p 64
FOCA
- Overview - b 1 p 90-92
FuzzDB
- Introduction - b 2 p 93
- XSS POC Payloads - b 4 p 74
Fuzzing
Heartbleed
- Overview - b 1 p 159-163
- Exploit Output - b 1 p 162
HTTP
- Attacker's Perspective of HTTP - b 1 p 132
- Methods - b 1 p 119--124
- CONNECT - b 1 p 123
- GET/HEAD/POST - b 1 p 121
- PUT/DELETE - b 1 p 124
- TRACE/OPTIONS - b 1 p 122
- Request Methods - b 1 p 120
- Supported Methods - b 2 p 23
- Index: Netcat > Determine Supported HTTP Request Methods
- Supported Methods - b 2 p 23
- Protocol - b 1 p 105-118
- Example HTTP 1.1 Request - b 1 p 114
- Example HTTP 1.1 Response - b 1 p 116
- History - b 1 p 106-108
- HTTP/0.9 - b 1 p 109
- HTTP/1.0 - b 1 p 110
- HTTP/1.1 - b 1 p 111
- HTTP/2 - b 1 p 112-113
- Status Codes - b 1 p 125-127
HTTPS
- Attacker's Perspective of HTTPS - b 1 p 145
- Certificate Trusts - b 1 p 144
- Encrypting HTTP in Transit - b 1 p 143
- Testing for Weak Ciphers - b 1 p 146-152
Information Leakage
- Overview - b 2 p 108-114
- Introduction - b 2 p 109
- Searching for CVEs - b 2 p 113
- Types of, - b 2 p 110
- Index: Directory Browsing
Interception Proxies
JavaScript
- Overview - b 4 p 5-15
JSON
- Overview - b 4 p 150-151
Logic Attacks
- Overview - b 5 p 27-29
Maltego
- Overview - b 1 p 94-96
- Index: Recon-ng
Metasploit
- Overview - b 5 p 102-116
- Introduction - b 5 p 102
- Exploiting Drupalgeddon - b 5 p 116
- Index: Drupal > Drupalgeddon
- Integrations - b 5 p 107
- BeEf + Metasploit - b 5 p 108-109
- Sqlmap <-> Metasploit - b 5 p 110
- Modules
- DNS - b 1 p 67
- WMAP - b 5 p 106
- Index:ding the Database - b 5 p 104
- db_import - b 5 p 105
- Using Known Vulnerabilities - b 5 p 111
- Web Testing - b 5 p 103
Mutillidae
- Overview - b 3 p 34-39
Netcat
- Determine Supported HTTP Request Methods - b 2 p 24
- Grabbing Server Connection Strings - b 2 p 11
- Server Version - b 2 p 12
Netcraft
- Overview - b 2 p 13-14
Nikto
- Overview - b 2 p 26
Nmap
- Introduction - b 2 p 10
- Analyzing HTTPS Support - b 1 p 150
- NSE Scripts
- DNS - b 1 p 64
- Port Scanner - b 2 p 6
- Example - b 2 p 7
NsLookup
- Introduction - b 1 p 61
Open Source Information
- Overview - b 1 p 79-104
- Introduction - b 1 p 79, 85
- Index: FOCA
- Index: Maltego
- Index: Recon-ng
- Index: Search Engines
- Index: Shodan
- Index: theHarvester
OpenSSL
- Scripting - b 1 p 149
OTG
- Penetration Testing - b 1 p 21
- Tests
- OTG-CONFIG-004: Review Unreferenced Files for Sensitive Information - b 2 p 108
- OTG-CONFIG-006: Test HTTP Methods - b 2 p 21
- OTG-CRYPST-001: Testing for Weak SSL/TSL Ciphers - b 1 p 147
- OTG-IDENT-004: Testing for Account Enumeration - b 2 p 175
- OTG-INFO-002: Fingerprint Web Server - b 2 p 20
- OTG-INFO-005 Review Webpage Comments and Metadata for Information Leakage - b 2 p 51
- OTG-INFO-006 Identify Application Entry Points - b 2 p 51
- OTG-INFO-007 Map Execution Paths Through Application - b 2 p 51
- OTG-INFO-008 Fingerprint Web Application Framework - b 2 p 51
- OTG-INFO-009 Fingerprint Web Application - b 2 p 51
- OTG-INFO-010 Map Application Architecture - b 2 p 51
- OTG-INPVAL-012: Testing for Code Injection: LFI/RFI - b 3 p 57
- OTG-INPVAL-013: Testing for Command Injection - b 3 p 41
- OTG-SESS-005: Test for Cross-Site Request Forgery - b 5 p 6
- Testing Categories - b 1 p 22
OWASP Testing Guide
- Index: OTG
PTR Record/Scan
- Index: DNS > Reverse DNS Scan
Python
- Overview - b 5 p 49-57
- Introduction - b 5 p 49
- Accessing Files - b 5 p 57
- Comments and Code Blocks - b 5 p 51
- Functions - b 5 p 54
- If Statement - b 5 p 52
- Looping Structures - b 5 p 53
- Making HTTP Requests - b 5 p 56
- Standard Library - b 5 p 55
- Variables - b 5 p 50
- Why Python? - b 5 p 48
Qualys
- Introduction - b 1 p 151
Query String Formats
- Introduction - b 1 p 118
Recon-ng
- Overview - b 1 p 97-104
- Introduction - b 1 p 97
- Modules - b 1 p 98
- Contacts - b 1 p 101
- Credentials - b 1 p 102
- Recon - b 1 p 100
- Sample for Geo-Location - b 1 p 104
- Sample for Hosts - b 1 p 103
- Show Module Info - b 1 p 99
- Index: Maltego
Reporting
- Overview - b 5 p 163-170
Robots
- Robot Control - b 2 p 54
Search Engines
- Introduction - b 1 p 80
- Google
- Automating Searches - b 1 p 84
- Hacking - b 1 p 83
- Search Directives - b 1 p 81
- Search Modifiers, - b 1 p 82
Server
- Default Pages - b 2 p 2
- Profiling - b 2 p 8
- Software Configuration - b 2 p 22
- Version - b 2 p 9
Sessions
- Fixation - b 3 p 14-23
- Index: Burp > Components > Sequencer > Session Analysis
- Tracking - b 3 p 5-12
Shellshock
- Overview - b 2 p 28-37
- Introduction - b 2 p 30
- Payloads - b 2 p 33
- Index: Command Injection
Shodan
- Overview - b 1 p 86-89
- Searching - b 1 p 89
Spidering
- Overview - b 2 p 51-64
- Analyzing Results - b 2 p 76-81
- Automated Spidering
- Index: Burp
- Index: Wappalyzer
- Index: Wget
- Index: ZAP
- Methods - b 2 p 53
- Specialized Tools
- Index: CeWL
- Index: Robots
SQL
- Data Types - b 3 p 84
- Query Modifiers - b 3 p 83
- Special Characters - b 3 p 85
- Verbs - b 3 p 82
SQL Injection
- Overview - b 3 p 79-81
- Introduction - b 3 p 79-81
- Discovering - b 3 p 97-117
- Binary/Boolean Interface Injection - b 3 p 113
- Blind Timing Interfaces - b 3 p 115
- Equivalent String Injections - b 3 p 110
- Increasing Blindness - b 3 p 114
- Inject For Comment - b 3 p 111-112
- Input Locations - b 3 p 98
- Without DB Errors - b 3 p 109
- Examples - b 3 p 86-91
- Exploiting - b 3 p 129-149
- Databases/Tables/Columns - b 3 p 131
- DB Fingerprinting - b 3 p 129
- (Meta)Database Info - b 3 p 130
- Stacked Queries - b 3 p 133-135
- UNIONizing - b 3 p 137-138
- Using NULL - b 3 p 141
- Data Types - b 3 p 142
- Blind Boolean Inference Exfiltration - b 3 p 145
- Methodology - b 3 p 92-95
- Tools - b 3 p 151-166
sqlmap
- Overview - b 3 p 153-166
- Introduction - b 3 p 153-156
- Auth/Sessions/Proxies - b 3 p 158
- Beyond DB Data Exfil - b 3 p 165-166
- DB Data Exfil - b 3 p 164
- DB Enumeration - b 3 p 163
- HTTP Headers - b 3 p 162
- Initial Targeting - b 3 p 157
- Proxies and Active Sessions - b 3 p 159
- Riding ZAP/Burp Sessions - b 3 p 160-161
- Index: Metasploit > Integrations > Sqlmap <-> Metasploit
SSL/TSL
- Index: HTTPS
theHarvester
- Introduction - b 1 p 93
Tools
- When Tools Fail - b 5 p 127-132
URI
- Introduction - b 1 p 117
w3af
- Overview - b 5 p 80-92
- Introduction - b 5 p 80
- Console - b 5 p 82
- Exploitation - b 5 p 92
- GUI - b 5 p 81
- Plugins - b 5 p 84
- Audit - b 5 p 87
- Brute Force - b 5 p 89
- Crawling - b 5 p 85
- Evasion - b 5 p 86
- Grep - b 5 p 88
- Running w3af - b 5 p 90
- Results - b 5 p 91
- Scripting - b 5 p 83
Wget
- Automated Spidering - b 2 p 63
User-Agent
- Introduction - b 1 p 115
Username Harvesting
- Introduction - b 2 p 176
- Authentication Pages - b 2 p 177
- Results to Look for - b 2 p 178
- Side Channel Attacks - b 2 p 179
- Practical Attacks - b 2 p 180
- Timing Attacks - b 2 p 181
- Practical Attacks - b 2 p 183
- Slow Hashing - b 2 p 182
Web
- Understanding the Web - b 1 p 12-15
- Introduction - b 1 p 12
- Characteristics of a Solid Methodology - b 1 p 13
- Knowledge of Tools - b 1 p 14
- Why the Web - b 1 p 6-10
- Introduction - b 1 p 6
- Cloud Basaed Applications - b 1 p 10
- Current Security Testing Is Often Limited - b 1 p 8
- Increased Functionality with Web 2.0 - b 1 p 9
- The Tangled Web - b 1 p 7
- Index: HTTP
Web App Pen Testing
- Creating Custom Scripts - b 5 p 47
- Methods - b 5 p 146-152
- Automated - b 5 p 151
- Black Box - b 5 p 146
- Grey Box - b 5 p 148
- Hybrid - b 5 p 152
- Manual - b 5 p 150
- Manual vs. Automated - b 5 p 149
- White Box - b 5 p 147
- Preparation - b 5 p 154-161
- Communications Planning - b 5 p 161
- Establishing the Test Scope - b 5 p 156
- Gathering Required Information - b 5 p 157
- Identifying Tester Traffic and Data in the App - b 5 p 159
- Managing a Test - b 5 p 155
- Permission to Test - b 1 p 15
- Rules of Engagement - b 5 p 158
- Test Preparation - b 5 p 154
- Testing Time Windows - b 5 p 160
- Toolkit
- Introduction - b 1 p 24
- Attack Platform - b 1 p 25-26
- Web Application Security Scanner - b 1 p 27
- Browsers - b 1 p 28
Wappalyzer
- Introduction - b 2 p 57
- Browser Extention - b 2 p 58
- Index: ZAP > Wappalyzer
WebSocket
- Introduction - b 1 p 129
- Implementation - b 1 p 130
- Tools - b 1 p 131
WHOIS
- Protocol - b 1 p 53
- Client Output - b 1 p 54
WPScan
- Introduction - b 5 p 66-67
XSS
- Introduction - b 4 p 33-47
- Parts of an XSS Attack - b 4 p 34
- Same Origin Policy - b 4 p 35
- Why Same Origin Policy? - b 4 p 36
- Enforcing the Same Origin Policy - b 4 p 37
- Discovering XSS - b 4 p 38
- XSS and Parameters - b 4 p 39
- Filtering - b 4 p 40-41
- Types of XSS - b 4 p 42-47
- Exploitation - b 4 p 96-105
- Cookie Catcher - b 4 p 100
- Evasion - b 4 p 103-105
- External Scripts - b 4 p 102
- GET -> POST XSS Flaws - b 4 p 97
- Reading Cookies - b 4 p 99
- Redirecting a User - b 4 p 101
- Fuzzing - b 4 p 63-74
- Introduction - b 4 p 63
- Browser False Positives - b 4 p 71-72
- Burp Intruder: Reflection Tests - b 4 p 64
- Battering Ram - b 4 p 65
- Grep: Payloads - b 4 p 66
- Initial Reflection Test Results - b 4 p 67
- Follow-Up Sniper Attack - b 4 p 68
- Bypassing Browser Filters - b 4 p 73
- Filter Bypass/Evasion - b 4 p 70
- Filter Tests - b 4 p 69
- XSS POC Payloads - b 4 p 74
- Tools - b 4 p 55-61
- Index: Interception Proxies
XSScrapy
- Introduction - b 4 p 61
XSSer
- Introduction - b 4 p 59-60
xsssniper
- Introduction - b 4 p 57-58
ZAP
- Introduction - b 1 p 35
- Attack Menu - b 1 p 37
- Automated Spidering - b 2 p 55-56
- CSRF Test Forms - b 5 p 13
- Forced Browse - b 2 p 61
- Interface - b 1 p 36
- Wappalyzer - b 2 p 59
- Technology Detection Extention - b 2 p 60
- Index: sqlmap > Riding ZAP/Burp Sessions
Study Guide: Home, Outline, Labs, Glossary, Appendix or Cheatsheets.