Skip to content

Web Security

January 9, 2025
May 18, 2015

cyber-security
dark-web
linux-security
ssl-tls
cyber-security#SQL injection

focus of web application and deployment

Web application security - Wikiwand
Category:Web security exploits - Wikiwand

Have I been pwned? Check if your email has been compromised in a data breach

HACKING GOOGLE - YouTube

Top 10 Web Hacking Techniques of 2015 | WhiteHat Security Blog

10 Web Security Vulnerabilities: Misconfiguration and More | Toptal
Logjam, Part 1: Why the Internet is Broken Again (an Explainer) | Electronic Frontier Foundation

paragonie/awesome-appsec: A curated list of resources for learning about application security
Single Page Web App Security Cheat Sheet

Rana Khalil - YouTube
Free Web Hacking Course - YouTube 1:08:03, Broken Access Control

Web Security Academy: Free Online Training from PortSwigger

The Art of Identifying Vulnerabilities - CascadiaFest 2015
How I find bugs in Web Applications | The ^lift Security Blog

前端安全冷门知识杂谈 | Litten 的博客
7 Steps to Secure JavaScript in 2021 | by Viduni Wickramarachchi | May, 2021 | Bits and Pieces
JavaScript Security Issues and Best Practices | by Mahdhi Rezvi | Bits and Pieces
The protocol-relative URL - Paul Irish

Identity eats security: How identity management is driving security | CSO Online detect intrusion beyond authentication

In Search for a Perfect Access Control System | Teleport

How to Secure Your React.js Application

Courses/Videos

APIsec University - Become an API Security Expert
Web Security Academy: Free Online Training from PortSwigger

1 Hour of Popular Web Attacks (XSS, CSRF, SSRF, SQL Injection, MIME Sniffing, Smuggling and more!) - YouTube

Vickie Li's Security Blog
Vickie Li Dev - YouTube
Attacking Web Applications - YouTube
Defending Web Applications - YouTube

28c3 - YouTube

Frontend Security - Frontend Conf 2013, Zürich - YouTube
HTML5DevConf May2014: Mark Stuart, PayPal: Web Security in Node.js and JavaScript Apps (SPAs) - YouTube
Web Security @ SFHTML5 - YouTube

Become a bug bounty hunter - Learn about web application vulnerabilities and how to find them on bug bounty programs | BugBountyHunter.com

Tools

SecurityWizardry.com - Directory

14 best open-source web application vulnerability scanners [updated for 2020] | Infosec
Error | Infosec
Burp Suite - Application Security Testing Software - PortSwigger
Download Burp Suite Community Edition - PortSwigger
Burp for Beginners: Introduction to Burp - YouTube

OWASP Zed Attack Proxy Project - OWASP
zaproxy/zaproxy: The OWASP ZAP core project

swatv3nub/IronWASP
IronWASP: An introduction | Infosec

sullo/nikto: Nikto web server scanner
Web Server Scanning With Nikto – A Beginner's Guide

Vega Vulnerability Scanner

Wapiti : a Free and Open-Source web-application vulnerability scanner in Python CMS
wapiti-scanner/wapiti: Web vulnerability scanner written in Python3

chaitin/xray: 一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
chaitin/xapp
chaitin/xpoc: 为供应链漏洞扫描设计的快速应急响应工具 [快速应急] [漏洞扫描] [端口扫描] [xray2.0进行时] A fast emergency response tool designed for supply chain vulnerability scanning.
chaitin/xray-plugins

BeEF - The Browser Exploitation Framework Project
beefproject/beef: The Browser Exploitation Framework Project
How to Use the BeEF Hacking Tool (2024)
i HACKED my wife’s web browser (it’s SCARY easy!!) - YouTube NetworkChuck
How to use BeEF, the Browser Exploitation Framework | TechTarget
How to use BeEF, the Browser Exploitation Framework - YouTube

andresriancho/w3af: w3af: web application attack and audit framework, the open source web vulnerability scanner. 😴inactive, last update 2020
Welcome to w3af’s documentation — w3af - Web application attack and audit framework 2019.1.2 documentation

amoldp/Grabber-Security-and-Vulnerability-Analysis- 😴inactive, last update 2015
SecurityWizardry.com - Grabber

killvxk/Yuki-Chan-The-Auto-Pentest-1: Automate Pentest Tool 😴inactive, last update 2012, CMS
Yuki Chan - Automated Penetration Testing and Auditing Tool in Kali Linux - GeeksforGeeks

skipfish - Google Code Archive - Long-term storage for Google Code Project Hosting. 😴inactive, last update 2012
Skipfish - Penetration Testing tool in Kali Linux - GeeksforGeeks
ratproxy - Google Code Archive - Long-term storage for Google Code Project Hosting. 😴inactive, last update 2009

Commercial

Codename SCNR – Ecsypno
brochure.pdf
scnr/installer: Installation script for Codename SCNR.
Introduction - Codename SCNR Documentation
Arachni / SCNR — Web Application Security Scanner Framework | by Arman Dwi Jatmiko | Medium

Codename RKN – Ecsypno
codename-rkn/installer: Installation script for Codename RKN.
Introduction - Codename RKN

Qualys Web Application Scanning | Qualys

How It Works | Web Application and API Security | Invicti
Add True IAST to DAST to Scale Your Security | Invicti
Crawl Where Other Vulnerability Scanners Can’t | Invicti

OWASP

The Open Web Application Security Project (OWASP) OWASP_SCP_Quick_Reference_Guide_v2.pdf
OWASP on GitHub

HTML5 Security · OWASP Cheat Sheet Series

OWASP Dependency Check - OWASP
Continuous Security Using OWASP - DZone Security

OWASP Web Security Testing Guide | OWASP Foundation
wstg/document at master · OWASP/wstg

OAuth 2.0 Hacking for Beginners with Farah Hawa - YouTube

Web Application Firewalls (WAFs)

Web application firewall - Wikiwand
Bypassing WAF Technologies. In recent years, the use of Web… | by Yealvare | Oct, 2024 | Medium

Vulnerable Environments/靶機

Top 13 Vulnerable Web Applications and Websites for Ethical Hacking Practice | by ByteBusterX | Medium

snoopysecurity/dvws-node: Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities. Node.js, Expressjs, XML_RPC, and Graphql

appsecco/dvna: Damn Vulnerable NodeJS Application Node.js API, 😴inactive, last update 2017
Aif4thah/VulnerableLightApp: Vulnerable API for educational purposes dotnet
Home of Acunetix Art

s4n7h0/xvwa: XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. PHP

mplat1409/vulnerable-app

OWASP VulnerableApp | OWASP Foundation
SasanLabs/VulnerableApp: OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts. Java REST API

OWASP Mutillidae II | OWASP Foundation
webpwnized/mutillidae: OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
webpwnized/mutillidae-dockerhub: OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security enthusiasts.
Using Mutillidae II - YouTube

OWASP Juice Shop | OWASP Foundation
OWASP Juice Shop
juice-shop/juice-shop: OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Pwning OWASP Juice Shop
juice-shop/SOLUTIONS.md at master · juice-shop/juice-shop
How to hack OWASP Juice Shop - A Guided Walkthrough showing all Solutions - YouTube

OWASP WebGoat | OWASP Foundation
WebGoat/WebGoat: WebGoat is a deliberately insecure application
Client XSS Introduction - DomGoat

Hackazon Installation Guide | AppSpider Documentation
rapid7/hackazon: A modern vulnerable web app
Newlode/hackazon: rapid7/hackazon vulnerable website in Docker container
cmutzel/all-in-one-hackazon: Run a docker container include hackazon, apache, and mysql

snoopysecurity/dvws: Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn real world web service vulnerabilities. NOTE: This project is out of date, please use https://github.com/snoopysecurity/dvws-node PHP
digininja/DVWA: Damn Vulnerable Web Application (DVWA) PHP

bWAPP, a buggy web application! PHP
ITSEC Games

Session Fixation

Session fixation - Wikiwand

SRI

Subresource Integrity - Web security | MDN
hash for resources

CSP

limits what scripts are trusted, mitigates XSS

Content-Security-Policy Header ⟶ CSP Reference & Examples
Content Security Policy (CSP) - HTTP | MDN
Content security policy | Web Security Academy

Using Content Security Policy (CSP) to Secure Web Applications
Enhance JavaScript Security with Content Security Policies | by Ashan Fernando | Bits and Pieces
Bypassing CSP with dangling iframes | PortSwigger Research

SSRF

Server-side request forgery - Wikiwand
What is SSRF (Server-side request forgery)? Tutorial & Examples | Web Security Academy

CORS/SOP

Cross Origin Resource Sharing
Same Origin Policy

Cross-origin resource sharing - Wikiwand
Cross-Origin Resource Sharing (CORS) - HTTP | MDN
enable cross-origin resource sharing

Cross-Origin Resource Sharing (CORS)  |  Articles  |  web.dev
Why you need "cross-origin isolated" for powerful features  |  Articles  |  web.dev

Getting CORS Working
Understanding CORS and cross-origin cookies | by Sharad Jain | Medium
authentication - Set cookies for cross origin requests - Stack Overflow
HTML5 Security Cheat Sheet - OWASP

XSRF/CSRF/CSURF

Cross-site request forgery - Wikiwand
What is CSRF (Cross-site request forgery)? Tutorial & Examples | Web Security Academy
Bypassing CSRF Protections: A Double Defeat of the Double-Submit Cookie Pattern
Cross-Site Request Forgery is dead!
CSRF Is Dead, Long Live SameSite=Lax! (or is it?) – Stephen's Thoughts
讓我們來談談 CSRF

Cross Site Request Forgery vs Server Side Request Forgery Explained - YouTube
Cross-Site Request Forgery (CSRF) Explained - YouTube

These are vulnerabilities that exploits trust on user's browser. Malicious scripts initiates attack from user's browser to the target site and reuse the cookie in the browser. The attack usually involves form submit or URL operation.
Same-Origin policy (SOP) only blocks reading response, not helpful in blocking CSRF

The counter-measure is to:

XSS

Cross-site scripting - Wikiwand
What is cross-site scripting (XSS) and how to prevent it? | Web Security Academy

Cross Site Scripting Prevention - OWASP Cheat Sheet Series
XSS Filter Evasion - OWASP Cheat Sheet Series

Excess XSS: A comprehensive tutorial on cross-site scripting
What is cross-site scripting (XSS) and how to prevent it? | Web Security Academy

What is cross-site scripting (XSS) and how to prevent it? | Web Security Academy
DOM clobbering | Web Security Academy

Your API-Centric Web App Is Probably Not Safe Against XSS and CSRF

trufflesecurity/xsshunter
Truffle Security relaunches XSS Hunter tool with new features | The Daily Swig

These are vulnerabilities that exploits trust on user inputs, the app renders or executes them without sanity check and escaping.
It usually involves running malicious in the target site and reusing the user session and accessing the target site's cookies.

一次对 Tui Editor XSS 的挖掘与分析 | 离别歌

// this triggers upon inserting to `innerHTML`
const root = document.createElement("div");
root.innerHTML = "<img src=1 onerror=alert(1)>";
root.innerHTML = "<details open ontoggle=alert(1)>";

Sanitizer

If markup is allowed, sanitize user input before saving to database

cure53/DOMPurify: DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
sanitize-html-react - npm

Node.js

Node Security Project
The ^lift Security Blog Newsletter

Unapply attack | Better world by better software
When This is Really That | The ^lift Security Blog

Node.js application (in)security - Ilja van Sprundel - OWASP AppSec California 2015 - YouTube

Helmet for express app
NodeJS Security Headers: 101 | Hacker Noon

Vulnerable Dependencies

npm audit

Retire.js
Dependency management + Code analytics for Node.js projects

Fingerprinting

How websites take browser fingerprints | Kaspersky official blog

Fighting TLS fingerprinting with Node.js | HTTP Toolkit

Researchers use GPU fingerprinting to track users online

CSS Security Vulnerabilities | CSS-Tricks - CSS-Tricks
CSS-Based Fingerprinting | CSS-Tricks - CSS-Tricks

What Is Browser Fingerprinting and How Does It Work? | SEON
FingerprintJS Open Source Demo

The device intelligence platform | Fingerprint
Demo: Disabling JavaScript Won’t Save You from Fingerprinting
The Top Browser Fingerprinting Techniques Explained - Fingerprint
How Does Canvas Fingerprinting Work - Fingerprint
Canvas Fingerprinting - BrowserLeaks
How the Web Audio API is used for audio fingerprinting