Web Hacking Tips
  • Web App Hacking Tips & Tricks
  • Weekly Tips
    • Week 1 - XSS Filter Evasion
    • Week 2 - CSRF Token Bypass
    • Week 3 - CORS Exploitation
    • Week 4 - Finding XSS
    • Week 5 - CSRF Explanation
    • Week 6 - XSS Types
    • Week 7 - Advanced SQLMap
    • Week 8 - Stealing HttpOnly Cookies from PHPINFO
    • Week 9 - SQLMap Tamper Scripts
    • Week 10 - XSS Obfuscated Payloads
    • Week 11 - XS-Search: Cross-Origin Enumeration
    • Week 12 - Subdomain Takeovers
    • Week 13 - XSS Keylogger
    • Week 14 - Algolia API Keys
    • Week 15 - GraphQL Introspection
    • Week 16 - Naming BurpSuite Repeater Tabs
    • Week 17 - GoBuster Tips
    • Week 18 - Burp Request to Python Script
    • Week 19 - Customizing Nikto Scans
    • Week 20 - Google Phishing Page
    • Week 21 - Google BITB
    • Week 22 - XSS Through SVG File
    • Week 23 - FoxyProxy Extension
    • Week 24 - CSP Bypasses
    • Week 25 - Pilfering LocalStorage with XSS
    • Week 26 - Cloud SSRF
    • Week 27 - Blind XSS
    • Week 28 - Firebase Misconfigurations
    • Week 29 - XSS to CSRF
  • Week 30 - SQLMap Debugging
  • Week 31 - WayBack Machine
  • Week 32 - O365 BITB
  • Week 33 - Burp Intruder Attacks
  • Week 34 - GraphQL Bruteforcing
  • Week 35 - User Accounts
  • Week 36 - CVE Submission
  • Week 37 - Second Order SQLi
  • Week 38 - Out of Band SQLi
  • Week 39 - Broken Link Hijacking
  • Week 40 - JWT Testing
  • Week 41 - BURP ATOR
  • Week 42 - ProxyChains
  • Week 43 - CSS Keylogging
  • Week 44 - SVG SSRF
  • Week 45 - Request Smuggling
  • Week 46 - XSS Payloads
  • Week 47 - DNS Re-binding
  • Week 48 - SSRF Bypass
  • Week 49 - File Upload Bypass
  • Week 50 - CRLF Injection
  • Week 51 - HTML to PDF
  • Week 52 - Parameter Pollution
  • Week 53 - Pre-Account Takeover
  • Week 54 - Race Conditions
  • Week 55 - SQLi to RCE
  • Week 56 - Cloud SSRF PrivEsc
  • Week 57 - Response Queue Poisoning
  • Week 58 - Directory Traversal
  • Week 59 - File Upload -> CSRF
  • Week 60 - Modern CSRF Attacks
Powered by GitBook
On this page
  • About The Author
  • Overview

Web App Hacking Tips & Tricks

https://www.linkedin.com/in/jakedmurphy1/

NextWeek 1 - XSS Filter Evasion

Last updated 2 years ago

Looking to identify web application security gaps through emulated, real-world attacks? You've come to the right place! On this site I share some modern, practical, and easy-to-implement tips for web pentesting.

These bite-sized tips include explanations, screen shots, code, and step-by-step instructions.

About The Author

Jake has extensive experience with bug bounties and the Bugcrowd platform, totaling over 70 discovered vulnerabilities in Fortune 500 companies in the banking, retail, and government industries. He was featured twice on local Pittsburgh news channels, once for developing a smart alarm clock app and again for a web application that helped people decide where to eat during the COVID-19 pandemic.

In the last several years Jake has cofounded FTW Sites, a company that provides websites for Chick-fil-A franchises across the country. He currently has 118 Chick-fil-A clients, and they are continuing to grow at a rapid pace. He believes the most satisfying part of running the company is the free Chick-fil-A sandwiches.

Overview

This website was created to store the Web App Hacking posts I made on LinkedIn throughout the year of 2022. Each week I posted a new tip of something I learned in the Offensive Security field. Hope you enjoy!

Jake is an Offensive Security Consultant at where he is experienced in both building and breaking web applications. He graduated from Grove City College after studying Computer Information Systems and has worked in the past with several Pittsburgh-based companies like Carnegie Mellon’s Computer Emergency Response Team (CERT).

If you would like to download a PDF of these articles in one place, click

Echelon Risk + Cyber
here
Page cover image