Non Parameter Exploit Testing - pentestfunctions/Hacking-For-Beginners GitHub Wiki

Social Engineering Techniques and Other Exploits

This document provides an overview of various social engineering techniques and other exploits in cybersecurity, with a focus on practical application and testing scenarios.

Table of Contents


Social Engineering Techniques

Phishing, Pretexting, Baiting

  • Phishing: Creating fake websites or emails to trick users into revealing sensitive information.
  • Pretexting: Fabricating scenarios to obtain privileged data.
  • Baiting: Offering something enticing to compromise security.

Typo Squatting

  • Dnstwister: Use tools like dnstwister to identify similar-looking domain names that can be used for typo squatting.

Other Exploits

Logic Flaws, CSRF

  • Logic Flaws: Identifying and exploiting logical errors in applications.
  • CSRF: Testing if the application is vulnerable to Cross-Site Request Forgery.

Subdomain Takeover

  • Techniques for identifying vulnerable subdomains, potentially leading to unauthorized control.

Clickjacking

  • Testing for UI redress vulnerabilities where users can be tricked into clicking unintended elements.

SSRF (Server-Side Request Forgery)

  • Identifying and exploiting SSRF vulnerabilities by manipulating server-side requests.

XXE (XML External Entity) Injection

  • Testing for XXE vulnerabilities in applications processing XML.

Deserialization Flaws

  • Exploiting unsafe deserialization that can lead to Remote Code Execution (RCE).

WebSockets Security Testing

  • Assessing security aspects of WebSockets in web applications.

CORS Misconfigurations

  • Testing for Cross-Origin Resource Sharing (CORS) issues that might expose data.

IDOR (Insecure Direct Object References)

  • Identifying and exploiting IDOR vulnerabilities.

Memory Corruption Exploits

  • Exploiting vulnerabilities related to memory corruption.

Container Security Assessment

  • Testing security in containerized environments like Docker, Kubernetes.

Cloud Storage Security

  • Assessing security in cloud storage solutions like AWS S3, Azure Blob Storage.

Frontend Framework Vulnerabilities

  • Security considerations in frameworks like Angular, React.

Mobile App Integration

  • Testing vulnerabilities in the interaction between web and mobile applications.

Web Application Protocol Testing

  • Testing protocols like MQTT, CoAP in IoT environments.

Blockchain Integration

  • Assessing security in blockchain-integrated applications.

Machine Learning Model Exploitation

  • Testing vulnerabilities in Machine Learning models.

Side-Channel Attacks

  • Identifying and exploiting side-channel attacks like timing attacks.

Security Headers Analysis

  • Testing for HTTP security headers to assess web application security.

Note: Always ensure that your testing is ethical, legal, and authorized. Unauthorized testing can result in serious legal consequences.