Web Security Academy (@websecacademy) 's Twitter Profile
Web Security Academy

@websecacademy

Free web security training from @PortSwigger

ID: 990945874019840000

linkhttps://portswigger.net/web-security calendar_today30-04-2018 13:28:02

1,1K Tweet

123,123K Takipçi

35 Takip Edilen

PortSwigger (@portswigger) 's Twitter Profile Photo

Burp in the Big Apple 🍎 PortSwigger is proud to sponsor HAC NYC as part of #APIDays this week. If you're at the event, swing by our stand to say hi! We’ve got exclusive Burp Suite NYC swag to give away! 🗽 #HACNYC #BurpSuite

Burp in the Big Apple 🍎

PortSwigger is proud to sponsor HAC NYC as part of #APIDays this week.
If you're at the event, swing by our stand to say hi! We’ve got exclusive Burp Suite NYC swag to give away! 🗽

#HACNYC #BurpSuite
Web Security Academy (@websecacademy) 's Twitter Profile Photo

How to test for reflected XSS in an HTML context with no encoding👇 A quick and easy manual test to see if a search bar is vulnerable to reflected XSS is to use a <u> tag to check if your input is underlined when it is reflected back. If it is, the app is likely vulnerable to

Web Security Academy (@websecacademy) 's Twitter Profile Photo

8 command seperators for injecting inject OS commands 👇 Command separators (work on Windows + Unix): 🔸 & 🔸 && 🔸 | 🔸 || Unix-only separators: 🔸 ; 🔸 Newline (0x0a or \n) Inline execution on Unix: 🔸 `injected command` 🔸 $(injected command) Different characters behave

Web Security Academy (@websecacademy) 's Twitter Profile Photo

Who doesn't like swag? We're always running Discord-only competitions, some cyber related and some just for the fun of it. If you want to win some cool swag, make sure join our Discord server for your chance to win! See you over there! 🤙 Join now: discord.gg/portswigger

Who doesn't like swag?

We're always running Discord-only competitions, some cyber related and some just for the fun of it. 

If you want to win some cool swag, make sure join our Discord server for your chance to win!

See you over there! 🤙 

Join now: discord.gg/portswigger
Web Security Academy (@websecacademy) 's Twitter Profile Photo

WAF filtering parentheses? Here’s how to bypass it 👇 Use a call function that doesn't use parentheses, like this one: 💥 onerror=alert;throw 1 💥 This works because 'onerror=alert' sets alert as the global error handler and then "throw 1" throws an error. That error is caught

WAF filtering parentheses? Here’s how to bypass it 👇

Use a call function that doesn't use parentheses, like this one:

💥 onerror=alert;throw 1 💥

This works because 'onerror=alert' sets alert as the global error handler and then "throw 1" throws an error. That error is caught
Web Security Academy (@websecacademy) 's Twitter Profile Photo

Business logic flaws silently ruin secure apps. They’re dangerous, persistent, and hard to detect. Here are 6 best practices to prevent business logic vulnerabilities👇 1️⃣ Understand your domain Developers and testers must understand the business logic driving the

Business logic flaws silently ruin secure apps.

They’re dangerous, persistent, and hard to detect.

Here are 6 best practices to prevent business logic vulnerabilities👇

1️⃣ Understand your domain

Developers and testers must understand the business logic driving the
Web Security Academy (@websecacademy) 's Twitter Profile Photo

How to use a single use promo code more than once using Burp Suite! In this quick fire "Limit overrun race conditions" lab walkthrough you'll learn to: - Create a Tab Group - Duplicate tabs multiple times - Send Group in Sequence - Send Group in Parallel to win race - Win a

Web Security Academy (@websecacademy) 's Twitter Profile Photo

Learn to exploit NoSQL like a pro! 🚀 This module walks you through fuzzing, logic bombs, data exfil via JavaScript and more! Start learning today: portswigger.net/web-security/n…

Learn to exploit NoSQL like a pro! 🚀

This module walks you through fuzzing, logic bombs, data exfil via JavaScript and more!

Start learning today: portswigger.net/web-security/n…
Web Security Academy (@websecacademy) 's Twitter Profile Photo

Directory traversal lets you read ANY file on a web server! In this video, you’ll learn how attackers exploit file path traversal vulnerabilities (and how to prevent them), including: 🔸 How file path traversal attacks manipulate servers 🔸Techniques used to bypass weak defenses

Web Security Academy (@websecacademy) 's Twitter Profile Photo

Want to find HTTP Request Smuggling vulns without manually crafting weird requests? Check out HTTP Request Smuggler, a Burp Suite extension that automates it for you! Learn more: portswigger.net/research/http-…

Web Security Academy (@websecacademy) 's Twitter Profile Photo

LAB WALKTHROUGH: HTTP Request Smuggling – Confirming a TE. CL vuln via differential responses. Learn how to smuggle a request to the back-end server, so that a subsequent request for / (the web root) triggers a 404 Not Found response. Try this lab now: portswigger.net/web-security/r…

Web Security Academy (@websecacademy) 's Twitter Profile Photo

Learning Path: Path traversal In this learning path, you'll explore how to exploit insecure file access to perform path traversal attacks (and how to prevent them down). You’ll learn: 🔸 What path traversal is and how it works 🔸 How to access arbitrary files using traversal

Learning Path: Path traversal

In this learning path, you'll explore how to exploit insecure file access to perform path traversal attacks (and how to prevent them down).

You’ll learn:
🔸 What path traversal is and how it works
🔸 How to access arbitrary files using traversal
Web Security Academy (@websecacademy) 's Twitter Profile Photo

How a harmless-looking fallback can become a full-blown XSS 💥 JavaScript libraries often rely on user-supplied configuration objects. A common pattern is: let transport_url = config.transport_url || defaults.transport_url; If config.transport_url is undefined, the default is

How a harmless-looking fallback can become a full-blown XSS 💥

JavaScript libraries often rely on user-supplied configuration objects. 

A common pattern is:
let transport_url = config.transport_url || defaults.transport_url;

If config.transport_url is undefined, the default is
Web Security Academy (@websecacademy) 's Twitter Profile Photo

Learning Path: API testing In this learning path, you'll learn: 🔸 How to find undocumented or unused API endpoints 🔸 Techniques to discover hidden parameters 🔸 How to test for mass assignment and SSPP 🔸 Methods to prevent vulnerabilities in APIs Start the API Testing

Learning Path: API testing

In this learning path, you'll learn:
🔸 How to find undocumented or unused API endpoints
🔸 Techniques to discover hidden parameters
🔸 How to test for mass assignment and SSPP
🔸 Methods to prevent vulnerabilities in APIs

Start the API Testing