Penetration Testing Final
Penetration Testing Final
Testing
AGENDA
• Penetration Testing
• Popular Vulnerabilities:
▪ HTML Injection
▪ SQL Injection
▪ CSRF
▪ XSS
▪ Login Authentication
C y b e r S e c u r i t y
Reference: https://www.extnoc.com/learn/general/penetration-testing
C y b e r S e c u r i t y
HTML Injection
Types:
• Stored: Injected code is saved on the server and
displayed to multiple users.
• Reflected: Injected code appears only in a single request.
C y b e r S e c u r i t y
• Risks:
• Content Manipulation: Alters page layout, misleading users.
• Phishing & Data Theft: Fake forms trick users into submitting
data.
• Trust Exploitation: Social engineering leverages user trust.
• Prevention:
• Input Validation & Sanitization: Filter and validate user inputs.
• CSP: Restrict content sources with Content Security Policy.
• Encoding: Encode outputs to prevent HTML rendering.
C y b e r S e c u r i t y
SQL Injection
What is CSRF?
• CSRF, or Cross-Site Request Forgery, is a web security
vulnerability that tricks a user into performing actions on
a website where they are authenticated. It exploits the
trust a website has in the user’s browser.
CSRF Example :
Preventing CSRF :
Protection Techniques:
• CSRF Tokens: Random tokens sent with forms,
verified on the server-side.
• Same-Site Cookies: Restrict cookies to prevent
unauthorized requests.
• User Confirmation: Add confirmation prompts
for sensitive actions.
Tools:
• Burp Suite
• XSRFProbe
C y b e r S e c u r i t y
XSS
Stored XSS: The malicious script is saved on the server (in a database,
comment field, etc.) and is delivered to users whenever they load the
affected page.
Reflected XSS: The injected script is reflected off a web server, such as in a
URL or error message. Often used in phishing attacks.
Tools:
• Burp Suite
• DalFox
• XSStrike
C y b e r S e c u r i t y
PREVENTION
Login Authentication
Tools:
• Hydra
• Nikto
• John the Ripper
Types of Authentication Methods
•Password-Based Authentication:
• The simplest and most common form of authentication.
• Users enter a unique password to gain access; security depends on
password strength.
•Biometric Authentication:
• Uses unique biological traits (fingerprints, facial recognition) for identity
verification.
• Offers a high level of security, as biometrics are hard to replicate.
• https://owasp.org/www-project-top-ten/
• https://www.infosecinstitute.com/resources/application-security/best-free-and-open-source-sql-injection-
tools/ext
• https://www.esecurityplanet.com/
• https://www.imperva.com/learn/application-security/html-injection/
• https://portswigger.net/web-security/csrf
• https://www.acunetix.com/websitesecurity/csrf-attacks/
• https://portswigger.net/web-security/cross-site-scripting
• https://portswigger.net/web-security/authentication
Thank You!