Site icon TheCyberThrone

CEH V13 Detailed Notes Part V

Advertisements

Introduction

Module 13 — Hacking Web Servers

Web servers are high-value targets that can expose sensitive data or allow total system compromise.
Understand reconnaissance, exploitation of misconfigurations, directory traversal, and web shell deployment.
Mitigate through patching, least privilege, web application firewalls, and secure configurations.

Module 14 — Hacking Web Applications

Web apps are primary attack surfaces due to their public exposure and user interaction.
Study OWASP Top 10 vulnerabilities — SQLi, XSS, CSRF, and authentication flaws.
Emphasize secure coding, input validation, and security testing (DAST/SAST) to build resilient applications.

Module 15 — SQL Injection

SQL injection manipulates database queries through unvalidated input to access or modify sensitive data.
Understand in-band, blind, and out-of-band techniques and tools like sqlmap.
Prevent through parameterized queries, least privilege, and proper error handling with input sanitization.

Module 13 — Hacking Web Servers

Overview & Purpose

Web servers host applications and content accessible from the Internet; they mediate requests between clients and backend systems (application runtimes, databases, caches). Attacking a web server can give direct access to hosted applications, sensitive configuration and credential files, or a foothold to move deeper into an environment. This module focuses on discovery, misconfiguration exploitation, server-side weaknesses, post-compromise persistence, and defense at the server level.

Attack Surface & Key Components

Typical Weaknesses & How They’re Abused

Attack Techniques

Post-Exploitation Risks

Detection Signals & Forensics

Defensive Controls & Hardening

Module 14 — Hacking Web Applications

Overview & Purpose

Web applications are frequent targets because they accept user input and implement business logic. This module concentrates on application-layer vulnerabilities that stem from how applications process input, manage sessions, enforce access control, and use third-party components. The focus is both on attack methodology and secure development practices to prevent exploitation.

Core Principles

High-Impact Vulnerability Classes

Injection (SQL, NoSQL, LDAP, Command)

Cross-Site Scripting (XSS)

Broken Authentication & Session Management

Broken Access Control (IDOR, escalation)

Security Misconfiguration

Sensitive Data Exposure

Insufficient Logging & Monitoring

CSRF (Cross-Site Request Forgery)

Using Components with Known Vulnerabilities

API-Specific Issues: Rate-limiting, schema validation, and improper CORS

Common Attack Patterns

Detection & Indicators

Secure Development & Prevention

Post-Exploitation Risks

Module 15 — SQL Injection

Overview & Purpose

SQL Injection (SQLi) is an application-layer vulnerability resulting from unsafe construction of database queries using untrusted input. It is among the most severe classes because it allows attackers to read, modify, or destroy database content and, in some cases, perform actions on the hosting server.

Why It’s Critical

Types of SQL Injection

In-Band SQL Injection

Blind SQL Injection

Out-of-Band (OOB) SQL Injection

Second-Order SQL Injection

Typical Application Weaknesses Leading to SQLi

Attack Consequences

Detection Signals & Monitoring

Defenses & Mitigations

Post-Exploitation Considerations

Combined Key Takeaways

Exit mobile version