Summary
In this chapter, we examined websites and the services that they provide to authorized users from the perspective of an attacker. We applied the kill chain perspective to web services in order to understand the correct application of reconnaissance and vulnerability scanning.
Several different techniques were presented: we focused on the hackers mindset while attacking a web application and what type of methodology is utilized during the penetration testing a web application; we learnt how the client-side proxies could be used to perform various different attacks and also a different set of tools that can perform brute forcing on websites and also run OS level commands through web application. Only a select few exploits were reviewed, and we completed the chapter with an examination of a web shell that is specific for web services.
In the next chapter, we will learn how to identify and attack remote access communications that connect users to the web services and escalate the privileges...