Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Learning Python Web Penetration Testing
  • Toc
  • feedback
Learning Python Web Penetration Testing

Learning Python Web Penetration Testing

By : Christian Martorella
4.3 (33)
close
Learning Python Web Penetration Testing

Learning Python Web Penetration Testing

4.3 (33)
By: Christian Martorella

Overview of this book

Web penetration testing is the use of tools and code to attack a website or web app in order to assess its vulnerability to external threats. While there are an increasing number of sophisticated, ready-made tools to scan systems for vulnerabilities, the use of Python allows you to write system-specific scripts, or alter and extend existing testing tools to find, exploit, and record as many security weaknesses as possible. Learning Python Web Penetration Testing will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for each activity throughout the process. The book begins by emphasizing the importance of knowing how to write your own tools with Python for web application penetration testing. You will then learn to interact with a web application using Python, understand the anatomy of an HTTP request, URL, headers and message body, and later create a script to perform a request, and interpret the response and its headers. As you make your way through the book, you will write a web crawler using Python and the Scrappy library. The book will also help you to develop a tool to perform brute force attacks in different parts of the web application. You will then discover more on detecting and exploiting SQL injection vulnerabilities. By the end of this book, you will have successfully created an HTTP proxy based on the mitmproxy tool.
Table of Contents (9 chapters)
close

Detecting SQL injection issues

In this section, we're going to learn how to detect SQL injections and how to alternate this in Python. We're going to look at what the different methods for detecting an SQLi in a web application are. Then, we'll proceed to automate the detection of these issues based on one of the methods. Finally, we'll enumerate the columns used in the query and also identify valid column names in the table.

Methods for detecting SQLi

In order to detect SQLi, we have three methods available:

  • Error based: This method injects payloads that break out of the original query and generate an SQL error on the server, which can be detected in the content of the returned pages:
  • Boolean: This...
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete