SlideShare a Scribd company logo
~ Aditya Kamat
BMS College of Engineering
WEB HACKING SERIES PART-1
WEBSITE?
• It is a collection of related web pages.
• Web pages consist of text or multimedia content.
• Can have a domain name.
• Can be accessible over the internet or LAN.
• URL(Uniform Resource Locator) is used to
identify the site.
PROTOCOL?
• Set of rules which are used for communication.
• We will look at:
• IP (Internet Protocol)
• HTTP (Hyper Text Transfer Protocol)
• HTTPS (Hyper Text Transfer Protocol Secure)
IP (INTERNET PROTOCOL)
• It has two versions:
• IPv4 (32 bits)
• IPv6 (128 bits)
• IPv4 is the most used one currently.
• IP address is assigned to each client in a network and it
is unique for each client.
• Example: 192.168.0.1, 110.211.2.65
PUBLIC IP ADDRESS
• It is given by the ISP (Internet Service provider) for
each connection.
• This is unique for every connection on the internet.
• IANA (Internet Assigned Numbers Authority) gives a
range of IP addresses to the ISP and the ISP then
gives them to their clients. In this way, the IP address of
two clients is never the same.
PRIVATE IP ADDRESS
• These are assigned to us by the routers present in our
home.
• This type of IP address is used when all devices are on
the same network.
• All devices in the same network will have different
private IP address but the same public address.
• The first octet of private IP address is 10 or 172 or 192
PUBLIC VS PRIVATE IP ADDRESS
Source: http://bharath-marrivada.blogspot.in/
HTTP (HYPER TEXT TRANSFER PROTOCOL)
• Three versions:
• HTTP/1.0
• HTTP/1.1
• HTTP/2
• HTTP functions as a request–response protocol in the client–
server computing model.
• The client submits an HTTP request message to the server.
• The server, which provides resources such as HTML files and
other content, or performs other functions on behalf of the client,
returns a response message to the client.
STATUS CODE
• 200 OK
• 301 MOVED PERMANENTLY
• 302 FOUND
• 304 NOT MODIFIED (Used by proxies/caches to check if
data is modified)
• 400 BAD REQUEST (Caused by client side error)
• 401 UNAUTHORIZED
• 403 FORBIDDEN
• 404 NOT FOUND
Source: https://en.wikipedia.org/wiki/List_of_HTTP_status_codes
HTTP METHODS
• GET
• HEAD
• POST
• PUT
• DELETE
• TRACE
GET METHOD
• It is used to retrieve entities/objects from web servers.
• Conditional get is used by web caches to check if data
is modified.
POST METHOD
• Parameters are passed in the message body.
• More secure than Get method.
Source: studytonight.com
WEB SOCKETS
• It is a combination of IP address and port address.
• It is used by the web server to identify unique hosts.
• Each client is assigned a socket by a server through
which it can communicate with the server.
• Server uses the concept of multi-threading to create
many sockets.
HTTPS
• HTTP over SSL(Secure Sockets layer)
• Default Port number 443.
• Main intention is to transfer data securely.
• In many websites, it is implemented only whenever
secret data (Payment info) is to be transferred.
• It is much slower than HTTP/1.1
ENOUGH OF THEORY,
LET US START
ATTACKING ;)
VULNERABILITIES WE WILL BE LOOKING
AT:-
• HTML injection.
• SQL injection to bypass authentication.
• Buffer overflow attack.
HTML INJECTION
• HTML tags are used to change the data that is inputted into the
form.
• It can also be used in the URL while sending data in the form of
parameters.
• Data is modified to take benefit of this vulnerability.
• Hackers usually try to steal account credentials as we will see in
the demo.
A FEW HTML TAGS
• <b> - To make the text bold.
• <i> - To italicize the text.
• <form> - To create a form.
• <input> - To create each element of the form.
• <table> - To create a table. <td> and <tr> are used to create
rows and columns.
SQL INJECTION TO BYPASS AUTHENTICATION.
• Main intention here is to login without knowing the username
and password.
• Single or double quote is used to end the string and the
statement/query inserted after that will be executed.
Source : learn.digilentic.com
QUERY / STATEMENT
• ‘ or 1=1 –-
• Even if the username or password entered is not true,
the result of the statement will be true because right
side of OR is true.
• Hence, We are allowed to login as the desired user.
BUFFER OVERFLOW
• It is a memory based attack on the server.
• If the input is not validated, the memory of the server can be
filled up with junk values.
• It is used to completely exhaust the resources of the server.
• An user defined function can also be executed after the buffer is
filled.
THANK YOU

More Related Content

What's hot

Secure Web Services
Secure Web ServicesSecure Web Services
Secure Web Services
Rob Daigneau
 

What's hot (20)

Wcf routing kt
Wcf routing ktWcf routing kt
Wcf routing kt
 
ASP.NET View State - Security Issues
ASP.NET View State - Security IssuesASP.NET View State - Security Issues
ASP.NET View State - Security Issues
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Cross site scripting XSS
Cross site scripting XSSCross site scripting XSS
Cross site scripting XSS
 
Heuristics to scale your framework
Heuristics to scale your frameworkHeuristics to scale your framework
Heuristics to scale your framework
 
SignalR
SignalR SignalR
SignalR
 
SQL injection basics
SQL injection basicsSQL injection basics
SQL injection basics
 
OWASP CSRF Protector
OWASP CSRF ProtectorOWASP CSRF Protector
OWASP CSRF Protector
 
Hack proof your ASP NET Applications
Hack proof your ASP NET ApplicationsHack proof your ASP NET Applications
Hack proof your ASP NET Applications
 
Flask jwt authentication tutorial
Flask jwt authentication tutorialFlask jwt authentication tutorial
Flask jwt authentication tutorial
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservices
 
Secure Web Services
Secure Web ServicesSecure Web Services
Secure Web Services
 
ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
Ajax part i
Ajax part iAjax part i
Ajax part i
 
Ruby on Rails Security Guide
Ruby on Rails Security GuideRuby on Rails Security Guide
Ruby on Rails Security Guide
 
Ruby Security
Ruby SecurityRuby Security
Ruby Security
 
Scheduling and monitoring with java in mule
Scheduling and monitoring with java in muleScheduling and monitoring with java in mule
Scheduling and monitoring with java in mule
 
Sql Injection attacks and prevention
Sql Injection attacks and preventionSql Injection attacks and prevention
Sql Injection attacks and prevention
 
Building an API Security Ecosystem
Building an API Security EcosystemBuilding an API Security Ecosystem
Building an API Security Ecosystem
 

Viewers also liked

2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
Jeremiah Grossman
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
Shubham Takode
 

Viewers also liked (19)

Web Hacking Intro
Web Hacking IntroWeb Hacking Intro
Web Hacking Intro
 
Problem Solving
Problem SolvingProblem Solving
Problem Solving
 
Problem-Solving Skills Guide
Problem-Solving Skills GuideProblem-Solving Skills Guide
Problem-Solving Skills Guide
 
Communications Skills Guide
Communications Skills GuideCommunications Skills Guide
Communications Skills Guide
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Izan esandi
Izan esandiIzan esandi
Izan esandi
 
Restaurant management
Restaurant managementRestaurant management
Restaurant management
 
Data visualization for e commerce of jcpenney
Data visualization for e commerce of jcpenneyData visualization for e commerce of jcpenney
Data visualization for e commerce of jcpenney
 
y3dips hacking priv8 network
y3dips hacking priv8 networky3dips hacking priv8 network
y3dips hacking priv8 network
 
What The Heck Is Hacking?
What The Heck Is Hacking? What The Heck Is Hacking?
What The Heck Is Hacking?
 
Advanced growth hacking
Advanced growth hackingAdvanced growth hacking
Advanced growth hacking
 
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
Advanced Web Hacking (EUSecWest 06)
Advanced Web Hacking (EUSecWest 06)Advanced Web Hacking (EUSecWest 06)
Advanced Web Hacking (EUSecWest 06)
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the WorldHacking Journalism: Using the Internet to Save the World
Hacking Journalism: Using the Internet to Save the World
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 

Similar to Web Hacking Series Part 1

0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
 

Similar to Web Hacking Series Part 1 (20)

Ch 3: Web Application Technologies
Ch 3: Web Application TechnologiesCh 3: Web Application Technologies
Ch 3: Web Application Technologies
 
SCWCD : The web client model : CHAP : 1
SCWCD  : The web client model : CHAP : 1SCWCD  : The web client model : CHAP : 1
SCWCD : The web client model : CHAP : 1
 
SCWCD : The web client model
SCWCD : The web client modelSCWCD : The web client model
SCWCD : The web client model
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
CNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application TechnologiesCNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application Technologies
 
CNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application Technologies
 
Httpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-convertedHttpbasics 1207412539273264-9-converted
Httpbasics 1207412539273264-9-converted
 
Advanced Web Design And Development BIT 3207
Advanced Web Design And Development BIT 3207Advanced Web Design And Development BIT 3207
Advanced Web Design And Development BIT 3207
 
Web technology Unit I Part C
Web technology Unit I  Part CWeb technology Unit I  Part C
Web technology Unit I Part C
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
 
Web Application Technologies
Web Application TechnologiesWeb Application Technologies
Web Application Technologies
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
 
SFDC Outbound Integrations
SFDC Outbound IntegrationsSFDC Outbound Integrations
SFDC Outbound Integrations
 
IP UNIT 1.pptx
IP UNIT 1.pptxIP UNIT 1.pptx
IP UNIT 1.pptx
 
Http
HttpHttp
Http
 
Web Technology Part 1
Web Technology Part 1Web Technology Part 1
Web Technology Part 1
 
Class 1 - World Wide Web Introduction
Class 1 - World Wide Web IntroductionClass 1 - World Wide Web Introduction
Class 1 - World Wide Web Introduction
 

Recently uploaded

Recently uploaded (20)

Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 

Web Hacking Series Part 1

  • 1. ~ Aditya Kamat BMS College of Engineering WEB HACKING SERIES PART-1
  • 2. WEBSITE? • It is a collection of related web pages. • Web pages consist of text or multimedia content. • Can have a domain name. • Can be accessible over the internet or LAN. • URL(Uniform Resource Locator) is used to identify the site.
  • 3. PROTOCOL? • Set of rules which are used for communication. • We will look at: • IP (Internet Protocol) • HTTP (Hyper Text Transfer Protocol) • HTTPS (Hyper Text Transfer Protocol Secure)
  • 4. IP (INTERNET PROTOCOL) • It has two versions: • IPv4 (32 bits) • IPv6 (128 bits) • IPv4 is the most used one currently. • IP address is assigned to each client in a network and it is unique for each client. • Example: 192.168.0.1, 110.211.2.65
  • 5. PUBLIC IP ADDRESS • It is given by the ISP (Internet Service provider) for each connection. • This is unique for every connection on the internet. • IANA (Internet Assigned Numbers Authority) gives a range of IP addresses to the ISP and the ISP then gives them to their clients. In this way, the IP address of two clients is never the same.
  • 6. PRIVATE IP ADDRESS • These are assigned to us by the routers present in our home. • This type of IP address is used when all devices are on the same network. • All devices in the same network will have different private IP address but the same public address. • The first octet of private IP address is 10 or 172 or 192
  • 7. PUBLIC VS PRIVATE IP ADDRESS Source: http://bharath-marrivada.blogspot.in/
  • 8. HTTP (HYPER TEXT TRANSFER PROTOCOL) • Three versions: • HTTP/1.0 • HTTP/1.1 • HTTP/2 • HTTP functions as a request–response protocol in the client– server computing model. • The client submits an HTTP request message to the server. • The server, which provides resources such as HTML files and other content, or performs other functions on behalf of the client, returns a response message to the client.
  • 9. STATUS CODE • 200 OK • 301 MOVED PERMANENTLY • 302 FOUND • 304 NOT MODIFIED (Used by proxies/caches to check if data is modified) • 400 BAD REQUEST (Caused by client side error) • 401 UNAUTHORIZED • 403 FORBIDDEN • 404 NOT FOUND Source: https://en.wikipedia.org/wiki/List_of_HTTP_status_codes
  • 10. HTTP METHODS • GET • HEAD • POST • PUT • DELETE • TRACE
  • 11. GET METHOD • It is used to retrieve entities/objects from web servers. • Conditional get is used by web caches to check if data is modified.
  • 12. POST METHOD • Parameters are passed in the message body. • More secure than Get method. Source: studytonight.com
  • 13. WEB SOCKETS • It is a combination of IP address and port address. • It is used by the web server to identify unique hosts. • Each client is assigned a socket by a server through which it can communicate with the server. • Server uses the concept of multi-threading to create many sockets.
  • 14. HTTPS • HTTP over SSL(Secure Sockets layer) • Default Port number 443. • Main intention is to transfer data securely. • In many websites, it is implemented only whenever secret data (Payment info) is to be transferred. • It is much slower than HTTP/1.1
  • 15. ENOUGH OF THEORY, LET US START ATTACKING ;)
  • 16. VULNERABILITIES WE WILL BE LOOKING AT:- • HTML injection. • SQL injection to bypass authentication. • Buffer overflow attack.
  • 17. HTML INJECTION • HTML tags are used to change the data that is inputted into the form. • It can also be used in the URL while sending data in the form of parameters. • Data is modified to take benefit of this vulnerability. • Hackers usually try to steal account credentials as we will see in the demo.
  • 18. A FEW HTML TAGS • <b> - To make the text bold. • <i> - To italicize the text. • <form> - To create a form. • <input> - To create each element of the form. • <table> - To create a table. <td> and <tr> are used to create rows and columns.
  • 19. SQL INJECTION TO BYPASS AUTHENTICATION. • Main intention here is to login without knowing the username and password. • Single or double quote is used to end the string and the statement/query inserted after that will be executed. Source : learn.digilentic.com
  • 20. QUERY / STATEMENT • ‘ or 1=1 –- • Even if the username or password entered is not true, the result of the statement will be true because right side of OR is true. • Hence, We are allowed to login as the desired user.
  • 21. BUFFER OVERFLOW • It is a memory based attack on the server. • If the input is not validated, the memory of the server can be filled up with junk values. • It is used to completely exhaust the resources of the server. • An user defined function can also be executed after the buffer is filled.