Chapter 4. Web App Exploitation – Beyond OWASP Top 10
In this chapter, we will cover the following recipes:
- Exploiting XSS with XSS Validator
- Injection attacks with
sqlmap
- Owning all
.svn
and.git
repositories - Winning race conditions
- Exploiting JBoss with JexBoss
- Exploiting PHP Object Injection
- Backdoors using web shells and meterpreters