Skip to content

im trying to learn something about web application security

Notifications You must be signed in to change notification settings

msfcode/WebAppSec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

33 Commits
 
 
 
 

Repository files navigation

Web Application Security

Installation and Setup

To practice and apply my knowledge, I will be installing Owasp Juice Shop, a vulnerable full JavaScript web application designed by Owasp.

  1. Clone the repository: git clone https://github.com/juice-shop/juice-shop
  2. Navigate to the project directory: cd juice-shop
  3. Install the required dependencies: npm install
  4. Start the application: npm start
Owasp Juice Shop Screenshot

Web Application Security Topics

During my learning journey, I will be covering various topics related to web application security. Some of the key areas include:

  1. Cross-Site Scripting (XSS)
  2. SQL Injection Fundamentals
  3. SQLMap
  4. Command Injections
  5. File Upload Attacks
  6. Broken Authentication
  7. File Inclusion
  8. XML Attacks
  9. XXE (XML External Entity) Attacks
  10. Insecure Direct Object References (IDOR)
  11. API Attacks

Cross-Site Scripting (XSS)

DOM-Based XSS Vulnerability

Unlike reflected XSS and stored XSS, the DOM-Based XSS vulnerability occurs on the client side. This means that an attacker can send a URL that contains some malicious JavaScript code. This code will be executed on the client's browser.

On the Juice Shop app, let's try searching for something, like "Apple" for example.

Try to inspect the elements of the website:

As we can see here, whatever we enter in the search input appears in the code:

Another example, what if we try to inject an <img> tag and replace the link with an image link like "https://i.imgflip.com/u9pv5.jpg":


We get that

But we can try to execute some JavaScript code using the <iframe> tag:

<iframe src="javascript:alert('DOMED')"></iframe>


You can, of course, search for another payload to test DOM-Based vulnerability on the

Hacker can take the link to send to other victims when their js code will run or the rick rolled video

About

im trying to learn something about web application security

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages