Web application penetration testing (basics) involves assessing a web app for security vulnerabilities that could be exploited by attackers. It starts with information gathering, followed by identifying common issues like SQL injection, XSS, CSRF, broken authentication, and insecure direct object references (IDOR). Tools like Burp Suite, OWASP ZAP, and browser dev tools are commonly used. The goal is to simulate real-world attacks to find and fix weaknesses before malicious actors can exploit them.
Scenario:
You are tasked with assessing the security of a newly developed internal web application for "Acme Corp." The application allows employees to submit and track IT support tickets. You have been provided with the URL (http://craw.local/support) and told to look for common vulnerabilities. The login page has a username and password field. Upon successful login, the user is presented with a dashboard where they can view their tickets, submit new tickets, and edit their profile.
You've spent some time exploring, and you notice some interesting behavior.