In OWASP Top 10, we usually see the most common way of finding and exploiting vulnerabilities. In this chapter, we will cover some of the uncommon cases that we might come across while hunting for bugs in a web application.
In this chapter, we will cover the following recipes:
- Exploiting XSS with XSS Validator
- Injection attacks with sqlpmap
- Owning all .svn and .git repositories
- Winning race conditions
- Exploiting XXEs
- Exploiting Jboss with JexBoss
- Exploiting PHP Object Injection
- Automating vulnerability detection with RapidScan
- Backdoors using meterpreter
- Backdoors using web shells