DiscoverHack for Fun and ProfitHacking a new web application from start to finish
Hacking a new web application from start to finish

Hacking a new web application from start to finish

Update: 2020-06-04
Share

Description

Hello ethical hackers and bug bounty hunters! I’ve recently conducted  a successful penetration testing against a web application built using  Google Web Toolkit, and I want to share with you the process I followed  and the bugs I found. Hopefully, this episode will inspire you to try  harder during your own bug bounty hunting and penetration testing  journey.


I will briefly explain what Google Web Toolkit is and what research  has already been made around it. Then, I will explain why and how I  built a Burp extension to help me during the penetration testing  process. Finally, I will share with you some vulnerabilities I found,  especially a cool one which required further effort. So stay with me as  we smash this web application into pieces!




Read more details on https://thehackerish.com/hacking-a-google-web-toolkit-application/


Watch the Broken Access Control approach on https://youtu.be/TJQpOrtet8E


Read about IDOR on https://thehackerish.com/idor-explained-owasp-top-10-vulnerabilities/

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Hacking a new web application from start to finish

Hacking a new web application from start to finish

thehackerish