Chapter Goal: This chapter will showcase how to implement an offensive approach to hunt bugs. And what type of tools are required?
No of pages: 10
Sub -Topics
1. Why hunt bugs?
2. Introducing Burp Suite
3. Introducing other tools
Chapter 2: Setting up Your Virtual Lab
Chapter Goal: This chapter will guide readers with the goal to set up the virtual labs.
No of pages: 10
Sub - Topics
1. Why we need Virtual Box
2. Introduction to Kali Linux – the hacker’s operating system
3. What type of tools are available in Kali
Chapter 3: Injecting Request Forgery
Chapter Goal: Readers will learn to create and manage request forgery on any web page.
No of pages: 10
Sub - Topics:
1. What is Request Forgery (CSRF)
2. Mission Critical Injection of CSRF
3. How to discover CSRF on any application
Chapter 4: Cross Site Scripting (XSS) Exploitation
Chapter Goal: This chapter will talk, comprehensively, about one of the most challenging tasks of any web application – to resist Cross Site Scripting or XSS Attacks.
No of pages: 15
Sub - Topics:
1. What is XSS
2. How we can exploit through XSS
3. How we can discover any XSS attack
Chapter 5: Header Injection and URL Redirection
Chapter Goal: This chapter will discuss header injection, cache poisoning, and URL redirection.
No of pages: 15
Sub - Topics:
1. What is header injection and how it is related to URL redirection
2. How Cross Site Scripting is done through Header Injection
3. How to discover header has been injected
4. How to find URL redirection vulnerabilities
Chapter 6: Uploading Malicious Files
Chapter Goal: Readers will learn about malicious file uploading and take forward bug bounty hunting.
Chapter Goal: This chapter will cover basic and advanced technique to test SPF and exploit it.
No of pages: 10
Sub - Topics:
1. Is there insufficient SPF records
2. How to exploit SPF
3. How to find the vulnerabilities and test it
Chapter 8: Injecting Unintended XML
Chapter Goal: Readers will learn about injecting unintended XML into any application.
No of pages: 10
Sub - Topics:
1. What is XML injection
2. How to perform XML injection in Virtual Lab
3. How to fetch System Configuration Files
Chapter 9: Command Injection
Chapter Goal: Readers will learn how an operating system falls prey to injected command and how attackers feed on those vulnerabilities.
No of pages: 10
Sub - Topics:
1. What is command injection
2. How to inject malicious commands
3. How to exploit command injection
Chapter 10: Exploiting HTML and SQL Injection
Chapter Goal: This chapter will teach readers the different attack vectors used to exploit HTML and SQL injection.
No of pages: 20
Sub - Topics:
1. What are HTML and SQL injection
2. How to find and exploit HTML injection
3. What are the header and cookie-based SQL injection
4. How to bypass authentication by SQLI
5. How to automate SQLI
Appendix: Further Reading
Chapter Goal: This section will show readers additional new features of bug hunting and how to exploit them.
No of pages: 10
Sub - Topics:
1. What tools can be used alongside Burp Suite
2. How source code disclosure helps information gathering
3. What could be the next challenges to hunt bugs
Sanjib Sinha is an author and tech writer. Being a certified .NET Windows and web developer, he has specialized in Python security programming, Linux, and many programming languages that include C#, PHP, Python, Dart, Java, and JavaScript. Sanjib has also won Microsoft's Community Contributor Award in 2011 and he has written Beginning Ethical Hacking with Python, Beginning Ethical Hacking with Kali Linux, and two editions of Beginning Laravel for Apress.
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it.
You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF),you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications.