Application Security
Reliable Resources for AppSec
Getting Started
Back end Servers
The hardware and operating system that hosts all other components and are usually run on operating systems like Linux, Windows, or using Containers.
Web Servers
Web servers handle HTTP requests and connections. Some examples are Apache, NGINX, and IIS.
Databases
Databases (DBs) store and retrieve the web application data. Some examples of relational databases are MySQL, MSSQL, Oracle, PostgreSQL, while examples of non-relational databases include NoSQL and MongoDB.
Development Frameworks
Development Frameworks are used to develop the core Web Application. Some well-known frameworks include PHP, C#, Java, Python, and NodeJS JavaScript
Field References
Reconnaissance
Directory Fuzzing
SubDomain/DNS Enumeration
Plugins
Nuclei burp plugin (in Bapp store) - generate nuclei template from burp requests
HackBar Extension (in Bapp store) - Security testing Payloads
IP Rotate Burp Extension (in BApp store)
Bypass-WAF (in BAPP store)
Autorize - Automatic authorization enforcement detection
Hackvertor – Handy type conversion
Sensitive Discoverer - Discovers sensitive information inside HTTP messages
Nowafpls - Bypass WAFs through the insertion of Junk Data
Attack Surface Detector (in BAppp store) - uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Additional Plugins
Burp Bounty – Profile-based scanner
Active Scan++ – Add more power to Burp’s Active Scanner
AuthMatrix – Authorization/PrivEsc checks
Broken Link Hijacking – For BLH (Broken Link Hijacking)
Collaborator Everywhere – Pingback/SSRF (Server-Side Request Forgery)
Command Injection Attacker
Content-Type Converter – Trying to bypass certain restrictions by changing Content-Type
Decoder Improved – More decoder features
Freddy – Deserialization
Flow – Better HTTP history
HTTP Request Smuggler
Hunt – Potential vuln identifier
InQL – GraphQL Introspection testing
J2EE Scan – Scanning J2EE apps
JSON/JS Beautifier
JSON Web Token Attacker
ParamMiner – Mine hidden parameters
Reflected File Download Checker
Reflected Parameter – Potential reflection
SAML Raider – SAML testing
Upload Scanner – File upload tester
Web Cache Deception Scanner
Common Attacks
Advanced Attacks
Last updated