Non Parameter Exploit Testing - pentestfunctions/Hacking-For-Beginners GitHub Wiki
Social Engineering Techniques and Other Exploits
This document provides an overview of various social engineering techniques and other exploits in cybersecurity, with a focus on practical application and testing scenarios.
Table of Contents
Social Engineering Techniques
Phishing, Pretexting, Baiting
- Phishing: Creating fake websites or emails to trick users into revealing sensitive information.
- Pretexting: Fabricating scenarios to obtain privileged data.
- Baiting: Offering something enticing to compromise security.
Typo Squatting
- Dnstwister: Use tools like dnstwister to identify similar-looking domain names that can be used for typo squatting.
Other Exploits
Logic Flaws, CSRF
- Logic Flaws: Identifying and exploiting logical errors in applications.
- CSRF: Testing if the application is vulnerable to Cross-Site Request Forgery.
Subdomain Takeover
- Techniques for identifying vulnerable subdomains, potentially leading to unauthorized control.
Clickjacking
- Testing for UI redress vulnerabilities where users can be tricked into clicking unintended elements.
SSRF (Server-Side Request Forgery)
- Identifying and exploiting SSRF vulnerabilities by manipulating server-side requests.
XXE (XML External Entity) Injection
- Testing for XXE vulnerabilities in applications processing XML.
Deserialization Flaws
- Exploiting unsafe deserialization that can lead to Remote Code Execution (RCE).
WebSockets Security Testing
- Assessing security aspects of WebSockets in web applications.
CORS Misconfigurations
- Testing for Cross-Origin Resource Sharing (CORS) issues that might expose data.
IDOR (Insecure Direct Object References)
- Identifying and exploiting IDOR vulnerabilities.
Memory Corruption Exploits
- Exploiting vulnerabilities related to memory corruption.
Container Security Assessment
- Testing security in containerized environments like Docker, Kubernetes.
Cloud Storage Security
- Assessing security in cloud storage solutions like AWS S3, Azure Blob Storage.
Frontend Framework Vulnerabilities
- Security considerations in frameworks like Angular, React.
Mobile App Integration
- Testing vulnerabilities in the interaction between web and mobile applications.
Web Application Protocol Testing
- Testing protocols like MQTT, CoAP in IoT environments.
Blockchain Integration
- Assessing security in blockchain-integrated applications.
Machine Learning Model Exploitation
- Testing vulnerabilities in Machine Learning models.
Side-Channel Attacks
- Identifying and exploiting side-channel attacks like timing attacks.
Security Headers Analysis
- Testing for HTTP security headers to assess web application security.
Note: Always ensure that your testing is ethical, legal, and authorized. Unauthorized testing can result in serious legal consequences.