Application Security

Reliable Resources for AppSec

Getting Started

Component
Description

Back end Servers

The hardware and operating system that hosts all other components and are usually run on operating systems like Linux, Windows, or using Containers.

Web Servers

Web servers handle HTTP requests and connections. Some examples are Apache, NGINX, and IIS.

Databases

Databases (DBs) store and retrieve the web application data. Some examples of relational databases are MySQL, MSSQL, Oracle, PostgreSQL, while examples of non-relational databases include NoSQL and MongoDB.

Development Frameworks

Development Frameworks are used to develop the core Web Application. Some well-known frameworks include PHP, C#, Java, Python, and NodeJS JavaScript

Field References

Plugins

Common

Nuclei burp plugin (in Bapp store) - generate nuclei template from burp requests

HackBar Extension (in Bapp store) - Security testing Payloads

IP Rotate Burp Extension (in BApp store)

Autorize - Automatic authorization enforcement detection

Hackvertor – Handy type conversion

Sensitive Discoverer - Discovers sensitive information inside HTTP messages

Nowafpls - Bypass WAFs through the insertion of Junk Data

Attack Surface Detector (in BAppp store) - uses static code analyses to identify web app endpoints by parsing routes and identifying parameters

Additional Plugins

Burp Bounty – Profile-based scanner

Active Scan++ – Add more power to Burp’s Active Scanner

AuthMatrix – Authorization/PrivEsc checks

Broken Link Hijacking – For BLH (Broken Link Hijacking)

Collaborator Everywhere – Pingback/SSRF (Server-Side Request Forgery)

Command Injection Attacker

Content-Type Converter – Trying to bypass certain restrictions by changing Content-Type

Decoder Improved – More decoder features

Freddy – Deserialization

Flow – Better HTTP history

HTTP Request Smuggler

Hunt – Potential vuln identifier

InQL – GraphQL Introspection testing

J2EE Scan – Scanning J2EE apps

JSON/JS Beautifier

JSON Web Token Attacker

ParamMiner – Mine hidden parameters

Reflected File Download Checker

Reflected Parameter – Potential reflection

SAML Raider – SAML testing

Upload Scanner – File upload tester

Web Cache Deception Scanner

Common Attacks

Advanced Attacks

Last updated