Go offline with the Player FM app!
Hacking a new web application from start to finish
Manage episode 316054880 series 3242802
Hello ethical hackers and bug bounty hunters! I’ve recently conducted a successful penetration testing against a web application built using Google Web Toolkit, and I want to share with you the process I followed and the bugs I found. Hopefully, this episode will inspire you to try harder during your own bug bounty hunting and penetration testing journey.
I will briefly explain what Google Web Toolkit is and what research has already been made around it. Then, I will explain why and how I built a Burp extension to help me during the penetration testing process. Finally, I will share with you some vulnerabilities I found, especially a cool one which required further effort. So stay with me as we smash this web application into pieces!
Read more details on https://thehackerish.com/hacking-a-google-web-toolkit-application/
Watch the Broken Access Control approach on https://youtu.be/TJQpOrtet8E
Read about IDOR on https://thehackerish.com/idor-explained-owasp-top-10-vulnerabilities/
11 episodes
Manage episode 316054880 series 3242802
Hello ethical hackers and bug bounty hunters! I’ve recently conducted a successful penetration testing against a web application built using Google Web Toolkit, and I want to share with you the process I followed and the bugs I found. Hopefully, this episode will inspire you to try harder during your own bug bounty hunting and penetration testing journey.
I will briefly explain what Google Web Toolkit is and what research has already been made around it. Then, I will explain why and how I built a Burp extension to help me during the penetration testing process. Finally, I will share with you some vulnerabilities I found, especially a cool one which required further effort. So stay with me as we smash this web application into pieces!
Read more details on https://thehackerish.com/hacking-a-google-web-toolkit-application/
Watch the Broken Access Control approach on https://youtu.be/TJQpOrtet8E
Read about IDOR on https://thehackerish.com/idor-explained-owasp-top-10-vulnerabilities/
11 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.