Hacking Concepts - taylorjohn/hacking GitHub Wiki
Hacking Concepts
Buffer Overflow
• Realistic Mission 15
Command Injection
• Basic Mission 7
• Basic Mission 8
• Basic Mission 9
• Realistic Mission 11
Cookie Stealing
• Realistic Mission 9
Cookie Tampering
• Basic Mission 10
• Realistic Mission 8
• Realistic Mission 9
• Realistic Mission 10
Cross-Site Scripting
• Realistic Mission 9
Directory Traversal
• Basic Mission 9
• Basic Mission 11
• Realistic Mission 3
• Realistic Mission 7
• Realistic Mission 11
• Realistic Mission 12
• Realistic Mission 13
• Realistic Mission 15
Decryption
• Basic Mission 6
• Realistic Mission 6
Hash Cracking
• Realistic Mission 5
• Realistic Mission 7
• Realistic Mission 13
• Realistic Mission 15
HTML Tampering
• Basic Mission 4
• Basic Mission 5
• Realistic Mission 1
JavaScript Injection
• Realistic Mission 8
• Realistic Mission 10
• Realistic Mission 15
JavaScript Tampering
• JavaScript Missions 1-7
Local File Intrusion
• Basic Mission 3
• Realistic Mission 12
• Realistic Mission 14
• Privilege Escalation
• Realistic Mission 11
SQL Injection
• Dumping Tables
• Realistic Mission 8
• Login Bypassing
• Realistic Mission 2
• Null Byte Injection
• Realistic Mission 14
UNION Attack
• Realistic Mission 4
Plaintext Attack
• Realistic Mission 15
User Agent Tampering
• Realistic Mission 10
URL Tampering
• Realistic Mission 1
• Realistic Mission 10
1. Command injection:
Exploiting a vulnerability to execute arbitrary commands on a system.
Example: Modifying a website's search functionality to execute system commands.
2. Directory traversal:
Accessing files or directories outside of the web server's root directory.
Example: Changing a URL parameter to navigate to sensitive system files.
3. Privilege escalation:
Elevating user privileges to gain unauthorized access.
Example: Exploiting a flaw to upgrade from a regular user to an administrator.
4. Hidden links:
Links embedded in a webpage's source code but not visible on the page.
Example: Embedding links to malicious sites disguised as legitimate ones.
5. Understanding account permissions:
Understanding and exploiting the level of access granted to a user account.
Example: Exploiting a misconfigured account to access sensitive data.
6. Exploiting weak passwords:
Gaining unauthorized access by exploiting passwords that are easy to guess or crack.
Example: Using a dictionary attack to guess a user's password.
7. Changing the user agent:
Modifying the user agent string sent to the server to impersonate a different client.
Example: Changing the user agent to access restricted content meant for specific browsers.
8. Cookie tampering:
Modifying cookies to gain unauthorized access or manipulate session data.
Example: Altering a session cookie to impersonate another user.
9. JavaScript injection:
Injecting malicious JavaScript code into a webpage.
Example: Injecting code to steal user credentials entered on a login page.
10. URL tampering:
Modifying parameters or components of a URL to exploit vulnerabilities.
Example: Changing parameters to access restricted areas of a website.
11. SQL injection:
Exploiting SQL vulnerabilities to manipulate a database.
Example: Injecting SQL code into a login form to bypass authentication.
12. Cross-site scripting (XSS):
Injecting malicious scripts into web pages viewed by other users.
Example: Injecting code to steal session cookies from other users.
13. Encryption and decryption:
Encoding and decoding data to protect it from unauthorized access.
Example: Encrypting sensitive information before storing it in a database.
14. Hash cracking:
Decrypting hashed passwords to reveal the original plaintext.
Example: Using brute force or dictionary attacks to crack hashed passwords.
15. HTML manipulation:
Altering the structure or content of HTML documents.
Example: Modifying HTML code to inject malicious scripts.
16. robots.txt:
A file that instructs web crawlers which pages to crawl or ignore.
Example: Using robots.txt to hide sensitive directories from search engines.
17. UNIX commands, ls:
Listing files and directories in a UNIX-based operating system.
Example: Using the ls command to view the contents of a directory.
18. SSI injection:
Exploiting server-side includes to execute arbitrary code.
Example: Injecting code into a webpage to include content from an external source.
Mission 19. URI schemes:
Identifiers used to specify resources or actions on the internet.
Example: Using the mailto: URI scheme to open the default email client.
20. Local file intrusion:
Accessing files stored on the local file system.
Example: Exploiting a vulnerability to read sensitive files on the server.
21. Plaintext attack:
Revealing sensitive information stored in plaintext format.
Example: Accessing a configuration file containing passwords stored in plaintext.
22. Buffer overflow:
Exploiting a flaw to overwrite memory beyond the boundaries of a buffer.
Example: Injecting excessive data into a buffer to execute arbitrary code.
23. Cross-Site Request Forgery (CSRF):
Exploiting the trust a website has in a user's browser to perform unauthorized actions on behalf of the user.
- Example: Forging a request to transfer funds from a user's bank account without their knowledge.
24. Session hijacking:
Taking over an active session between a user and a web application to gain unauthorized access.
- Example: Stealing a session cookie to impersonate a logged-in user and perform actions on their behalf.
25. Clickjacking:
Tricking users into clicking on a disguised UI element to perform unintended actions without their knowledge.
- Example: Overlaying a transparent page element over a legitimate button, so clicking the button actually performs a different action.
26. Denial of Service (DoS) and Distributed Denial of Service (DDoS):
Overloading a server or network with excessive traffic to disrupt normal operations.
- Example: Flooding a website with requests to make it unreachable to legitimate users.
27. Cross-Origin Resource Sharing (CORS) misconfiguration:
Allowing unauthorized websites to access restricted resources on a web server.
- Example: Allowing a malicious website to make AJAX requests to a vulnerable web application and retrieve sensitive data.
28. XML External Entity (XXE) Injection:
Exploiting vulnerable XML parsers to disclose confidential data or execute arbitrary code.
- Example: Injecting an external entity into an XML document to read sensitive files on the server.