Hacking Concepts - taylorjohn/hacking GitHub Wiki

Hacking Concepts

Buffer Overflow

•	Realistic Mission 15

Command Injection

•	Basic Mission 7
•	Basic Mission 8
•	Basic Mission 9
•	Realistic Mission 11

Cookie Stealing

•	Realistic Mission 9

Cookie Tampering

•	Basic Mission 10
•	Realistic Mission 8
•	Realistic Mission 9
•	Realistic Mission 10

Cross-Site Scripting

•	Realistic Mission 9

Directory Traversal

•	Basic Mission 9
•	Basic Mission 11
•	Realistic Mission 3
•	Realistic Mission 7
•	Realistic Mission 11
•	Realistic Mission 12
•	Realistic Mission 13
•	Realistic Mission 15

Decryption

•	Basic Mission 6
•	Realistic Mission 6

Hash Cracking

•	Realistic Mission 5
•	Realistic Mission 7
•	Realistic Mission 13
•	Realistic Mission 15

HTML Tampering

•	Basic Mission 4
•	Basic Mission 5
•	Realistic Mission 1

JavaScript Injection

•	Realistic Mission 8
•	Realistic Mission 10
•	Realistic Mission 15

JavaScript Tampering

•	JavaScript Missions 1-7

Local File Intrusion

•	Basic Mission 3
•	Realistic Mission 12
•	Realistic Mission 14
•	Privilege Escalation
•	Realistic Mission 11

SQL Injection

•	Dumping Tables
•	Realistic Mission 8
•	Login Bypassing
•	Realistic Mission 2
•	Null Byte Injection
•	Realistic Mission 14

UNION Attack

•	Realistic Mission 4

Plaintext Attack

•	Realistic Mission 15

User Agent Tampering

•	Realistic Mission 10

URL Tampering

•	Realistic Mission 1
•	Realistic Mission 10

1. Command injection:

Exploiting a vulnerability to execute arbitrary commands on a system.
Example: Modifying a website's search functionality to execute system commands.

2. Directory traversal:

Accessing files or directories outside of the web server's root directory.
Example: Changing a URL parameter to navigate to sensitive system files.

3. Privilege escalation:

Elevating user privileges to gain unauthorized access.
Example: Exploiting a flaw to upgrade from a regular user to an administrator.

4. Hidden links:

Links embedded in a webpage's source code but not visible on the page.
Example: Embedding links to malicious sites disguised as legitimate ones.

5. Understanding account permissions:

Understanding and exploiting the level of access granted to a user account.
Example: Exploiting a misconfigured account to access sensitive data.

6. Exploiting weak passwords:

Gaining unauthorized access by exploiting passwords that are easy to guess or crack.
Example: Using a dictionary attack to guess a user's password.

7. Changing the user agent:

Modifying the user agent string sent to the server to impersonate a different client.
Example: Changing the user agent to access restricted content meant for specific browsers.

8. Cookie tampering:

Modifying cookies to gain unauthorized access or manipulate session data.
Example: Altering a session cookie to impersonate another user.

9. JavaScript injection:

Injecting malicious JavaScript code into a webpage.
Example: Injecting code to steal user credentials entered on a login page.

10. URL tampering:

Modifying parameters or components of a URL to exploit vulnerabilities.
Example: Changing parameters to access restricted areas of a website.

11. SQL injection:

Exploiting SQL vulnerabilities to manipulate a database.
Example: Injecting SQL code into a login form to bypass authentication.

12. Cross-site scripting (XSS):

Injecting malicious scripts into web pages viewed by other users.
Example: Injecting code to steal session cookies from other users.

13. Encryption and decryption:

Encoding and decoding data to protect it from unauthorized access.
Example: Encrypting sensitive information before storing it in a database.

14. Hash cracking:

Decrypting hashed passwords to reveal the original plaintext.
Example: Using brute force or dictionary attacks to crack hashed passwords.

15. HTML manipulation:

Altering the structure or content of HTML documents.
Example: Modifying HTML code to inject malicious scripts.

16. robots.txt:

A file that instructs web crawlers which pages to crawl or ignore.
Example: Using robots.txt to hide sensitive directories from search engines.

17. UNIX commands, ls:

Listing files and directories in a UNIX-based operating system.
Example: Using the ls command to view the contents of a directory.

18. SSI injection:

Exploiting server-side includes to execute arbitrary code.
Example: Injecting code into a webpage to include content from an external source.

Mission 19. URI schemes:

Identifiers used to specify resources or actions on the internet.
Example: Using the mailto: URI scheme to open the default email client.

20. Local file intrusion:

Accessing files stored on the local file system.
Example: Exploiting a vulnerability to read sensitive files on the server.

21. Plaintext attack:

Revealing sensitive information stored in plaintext format.
Example: Accessing a configuration file containing passwords stored in plaintext.

22. Buffer overflow:

Exploiting a flaw to overwrite memory beyond the boundaries of a buffer.
Example: Injecting excessive data into a buffer to execute arbitrary code.

23. Cross-Site Request Forgery (CSRF):

Exploiting the trust a website has in a user's browser to perform unauthorized actions on behalf of the user.

  • Example: Forging a request to transfer funds from a user's bank account without their knowledge.

24. Session hijacking:

Taking over an active session between a user and a web application to gain unauthorized access.

  • Example: Stealing a session cookie to impersonate a logged-in user and perform actions on their behalf.

25. Clickjacking:

Tricking users into clicking on a disguised UI element to perform unintended actions without their knowledge.

  • Example: Overlaying a transparent page element over a legitimate button, so clicking the button actually performs a different action.

26. Denial of Service (DoS) and Distributed Denial of Service (DDoS):

Overloading a server or network with excessive traffic to disrupt normal operations.

  • Example: Flooding a website with requests to make it unreachable to legitimate users.

27. Cross-Origin Resource Sharing (CORS) misconfiguration:

Allowing unauthorized websites to access restricted resources on a web server.

  • Example: Allowing a malicious website to make AJAX requests to a vulnerable web application and retrieve sensitive data.

28. XML External Entity (XXE) Injection:

Exploiting vulnerable XML parsers to disclose confidential data or execute arbitrary code.

  • Example: Injecting an external entity into an XML document to read sensitive files on the server.