Mindset and Methodologies
Welcome to the first chapter, where we will begin our journey by understanding the right approach, mindset, and methodologies for attacking and exploiting modern web applications.
As we read in the epigraph, taken from the book A Guide to Kernel Exploitation, written by a dear friend, exploitation is considered an art, which makes it difficult to systematize. While our discussion focuses on web applications rather than the Linux kernel, it is essential to clarify what we mean by attacking web applications and exploiting their vulnerabilities.
In the first part of this chapter, we will clarify these concepts and learn about the approach, the steps of an attack, the testing techniques, the mindset, and the competencies we need to have.
In the second part, we will learn about the existing methodologies and how to combine them to use them effectively in real-world scenarios.
In this chapter, we’re going to cover the following main topics:
- Approach and mindset
- Methodologies and frameworks for attacking web applications