eWPTXv3 - Notes
GitHubPortfolioTwitter/X MediumCont@ctHome
  • 📝eWPTXv3
    • Web Application Penetration Testing Methodology
      • 1.1 Introduction to Web App Security Testing
        • 1.1.1 Web Application
        • 1.1.2 Web App Architecture
        • 1.1.3 HTTP/HTTPS
      • 1.2 Web App Pentesting Methodology
    • Web Application Reconnaissance
      • 2.1 Information Gathering
        • 2.1.1 DNS Recon
          • 2.1.1.1 DNS Zone Transfer
          • 2.1.1.2 Subdomain Enumeration
        • 2.1.2 WAF Recon
      • 2.2 Passive Crawling & Spidering
      • 2.3 Web Server Fingerprinting
        • 2.3.1 File & Directory Brute-Force
      • 2.4 Web Proxies
        • 2.4.1 Burp Suite
        • 2.4.2 OWASP ZAP
    • Authentication Attacks
      • 6.1 HTTP Attacks
        • 6.1.1 HTTP Method Tampering
        • 6.1.2 Attacking HTTP Authentication
      • 6.2 Session Attacks
        • 6.2.1 Session Hijacking
        • 6.2.2 Session Fixation
        • 6.2.3 Session Hijacking via Cookie Tampering
      • 6.3 JWT Attacks
      • 6.4 CSRF
    • Injection Vulnerabilities
      • 4.1 Command Injection
      • 4.2 Cross-Site Scripting (XSS)
        • 4.2.1 XSS Anatomy
        • 4.2.2 Reflected XSS
        • 4.2.3 Stored XSS
        • 4.2.4 DOM-Based XSS
        • 4.2.5 Identifying & Exploiting XSS with XSSer
      • 4.3 ​SQL Injection (SQLi)
        • 4.3.1 DB & SQL Introduction
        • 4.3.2 SQL Injection (SQLi)
        • 4.3.3 In-Band SQLi
        • 4.3.4 Blind SQLi
        • 4.3.5 NoSQL
        • 4.3.6 SQLMap
        • 4.3.7 Mitigation Strategies
    • API Penetration Testing
      • 5.1 API Testing
    • Server-Side Attacks
      • 6.1 Server-side request forgery (SSRF)
      • 6.2 Deserialization
      • 6.3 ​File & Resource Attacks
        • 6.1 File Upload Vulnerability
        • 6.2 Directory Traversal
        • 6.3 File Inclusion (LFI and RFI)
          • 6.3.1 Local File Inclusion (LFI)
          • 6.3.2 Remote File Inclusion (RFI)
        • 6.4 CMS Pentesting
          • 6.4.1 Wordpress, Drupal & Magento
    • Filter Evasion & WAF Bypass
      • 7.1 Obfuscating attacks using encodings
    • 📄Report
      • How to write a PT Report
  • 🛣️RoadMap / Exam Preparation
  • 📔eWPTX Cheat Sheet
Powered by GitBook
On this page
  • Topics
  • What is a Web Proxy?
  • Web Proxy vs Web Proxy Servers
  1. eWPTXv3
  2. Web Application Reconnaissance

2.4 Web Proxies

Previous2.3.1 File & Directory Brute-ForceNext2.4.1 Burp Suite

Topics

What is a Web Proxy?

A web proxy, also known as an interception proxy, serves to capture, analyze, and alter requests and responses passing between an HTTP client and a server.

Intercepting HTTP/HTTPS traffic allows penetration testers to scrutinize and understand the behavior and functionalities of web applications.

Proxies stand as essential tools in conducting web application penetration tests, evolving into indispensable allies in the assessment and testing of web applications.

Penetration testers rely on web proxies to intercept, analyze, and modify HTTP requests before they reach the web server.

Web proxies commonly function by intercepting traffic from the client browser, accomplished by configuring the browser to route all traffic through the preferred web proxy.

The main goals of intercepting requests and responses are to:

  • Analyze the behavior and functionality of web applications.

  • Map out the structure of the web application, such as its sitemap.

  • Identify vulnerabilities and misconfigurations in web applications.

  • Assess and launch attacks against web applications.

Among the most prevalent and relied-upon web proxies in use today are:

  • Another good similar application is , feel free to discover it.

Web Proxy vs Web Proxy Servers

Distinguishing between web proxies and proxy servers is crucial:

  • A web proxy intercepts, analyzes, or modifies HTTP/HTTPS requests between a client and server, exemplified by tools like Burp Suite or OWASP ZAP.

  • On the other hand, a web proxy server handles internet traffic proxying, filtering specific data, and optimizing bandwidth, as seen in applications like Squid Proxy.

❗ Disclaimer

Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!❗

📝
Burp Suite
OWASP ZAP
Burp Suite
OWASP ZAP
Caido