Web Exploitation
November 14th, 2018
Get Involved
● Discord - discord.gg/kuejt8p
Events
● November 28th - Windows Exploitation
● December 5th - Stress Buster - ECSS 4.619
SQL Injection is useless* if the server
isn’t using SQL
OR: “Why I fail at Web Exploitation”
Why is Web Exploitation difficult?
We don’t know what is running!
2 Questions of Web Exploitation
● What can I do?
● What does the server do when I do that?
What are developers bad at?
● Deserialization
● Escaping input to be rendered/executed
● Making sure only the right people can do the “right” things
Web Primer
Client-side Technologies
● HTML
● CSS
● Javascript (Good for execution malicious code in a users browser)
Server-side Technologies
Yes
Server-side Technologies (I’ve seen and exploited)
● PHP - CSAW 2016
● Python - Hack The Box
● NodeJS - Hack The Box
● Bash - CSAW 2016
● Java - Hack The Box
● Rust - TexSAW 2017
● C - Hack The Box
Web Exploitation is a game of search
and research
What can I do? - Tips
● Reverse engineer known page functionality, see how it communicates with the
server (Burp / Inspect Element + Console)
● Check common directories for additional functionality
● Bruteforce common directories/files for additional functionality (gobuster)
● Bruteforce subdomains for additional functionality (gobuster)
What does the server do when I do that? - Tips
● Fuzz inputs (send ;:’”!@#$%^&*(((()-_=+)
● Research assumed functionality, look for how people have exploited it in the
past (OWASP Top 10)
● Look for UNIQUE functionality that you haven’t seen elsewhere (Unique
inclusion of special protections like a strict CSP) - Particularly useful if you
know the application is or used to be vulnerable
Making life easy
Goals
● Reading files off disk
● Executing code on the remote server
Case Study - DevOops
Additional Thoughts
A “Modern” Web Architecture

Web Exploitation