How to discover and exploit SQL injection vulnerabilities
In this section, we will begin our understanding of what is installed on the website, analyze WordPress by studying its source code and documentation, and then use dynamic analysis to confirm and exploit the vulnerability.
We will then identify an XSS vulnerability and provide a broad overview of the other potential vulnerabilities we can discover.
Information gathering and threat modeling
When we encounter a new application or website, we need to gather information and understand what kinds of attacks we can make.
The simplest but a particularly effective way is to examine the HTML code and review the HTTP headers to understand its nature.
We already looked at the structure of WordPress in Chapter 1. Let’s take a look at the meta
tag generator
using curl
:
$ curl -kis http://localhost | grep generator <meta name="generator" content="WordPress 6.1.1" />
It’...