{"id":3922,"date":"2019-06-30T15:28:16","date_gmt":"2019-06-30T09:58:16","guid":{"rendered":"https:\/\/cyberzombie.in\/?p=3922"},"modified":"2020-09-13T06:29:32","modified_gmt":"2020-09-13T06:29:32","slug":"web-application-pentesting-part-1-methodology","status":"publish","type":"post","link":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/","title":{"rendered":"Web Application PenTesting Part 1 (Methodology)"},"content":{"rendered":"<p class=\"has-drop-cap has-text-align-left has-medium-font-size\">Hello Guys, Ninad here I hope you are doing good, so today&#8217;s topic is How to start with web application pen-testing. I would be dividing this Web Application Pentesting into 3 parts,<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br> Part 1) <strong><em>Methodology.<\/em><\/strong><br> Part 2) <strong><em>Client-side attacks.<br> <\/em><\/strong>Part 3) <strong><em>Server-side attacks.<\/em><\/strong><br><\/p>\n\n\n\n<p class=\"has-medium-font-size\">In <strong><em>Part 1<\/em><\/strong> Methodology, I would be Sharing my knowledge with you about How to start with Web Application pen-testing?<br>In <strong><em>Part 2<\/em><\/strong> Client-side attacks, I would go in detail for client-side attacks like How to attack? How to mitigate? What are the client side attacks?<br>In <strong><em>Part 3<\/em><\/strong> Server-side attacks, I would go in detail for Server-side attacks like How to attack? How to mitigate? What are the client side attacks?  What is the attack scenario&#8217;s ..etc.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">So Generally, What is Pen-testing?<br>As of me, <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-large\"><p>It&#8217;s a practice implemented to mitigate security threats in any domain<\/p><\/blockquote>\n\n\n\n<p class=\"has-medium-font-size\">Here we are going to discuss Web Application Pen-testing, There&#8217;s one point which I would like to make it clear that web application pen-testing is totally different than bug bounties. So Don&#8217;t get confused with it.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/media.giphy.com\/media\/xUySTwI1AoIbf57QKk\/giphy.gif\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"has-text-align-center wp-block-heading\">How to Start Web Application Pen-testing?<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\">There are some security testing standards In web application pen-testing which you would like to follow Such as<br> 1) OWASP (Open Web Application Security Project)<br> 2) SANS (Sysadmin, Audit, Network And Security )<br> 3) OSSTMM ( Open source SecurityTesting Methodology Manual)<br> 4)  ISSAF ( Information  Systems Security Assesment Framework)<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"has-text-align-center wp-block-heading\">If you would ask me How to?<\/h5>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/media.giphy.com\/media\/3ohc0ZPr8RR5QnjV4c\/giphy.gif\" alt=\"\" width=\"286\" height=\"286\"\/><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\">I would start with basic&#8217;s, one should have basic knowledge of how a web application works, some programming knowledge like HTML, CSS Javascript, PHP, MYSQL..etc.<br>basically, if you have the above then you are good to start web application pen-testing. After this, you Should get know how a web application works its workflow, like what is HTTP? https? &#8230;etc.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">How would you go for it? let divide the web application pen-testing into two parts<br> 1) Client side pen-testing<br> 2) Server-side pen-testing<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Client-side pen testing:<\/em><\/strong><\/h4>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\">Client-side attacks are quite different. These are attacks that target vulnerabilities in client applications that interact with a malicious server or process malicious data. Here, the client initiates the connection that could result in an attack. If a client does not interact with a server, it is not at risk, because it doesn\u2019t process any potentially harmful data sent from the server. Client-side pen-testing may consist of vulnerabilities which often takes the form of unpatched software on a desktop or laptop. Depending on the nature of the vulnerable application, an attacker could exploit it via a specially-crafted email attachment or by convincing the user to visit a malicious Web site. Some targets include Web Browser&#8217;s, Adobe Acrobat, Macromedia Flash, QuickTime and Java Runtime Environment.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Some of the client side attacks might be like XSS, redirects, Phishing, Clickjacking, IDOR ..etc<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Server-side Pen-Testing:<\/em><\/strong><\/h4>\n\n\n\n<p class=\"has-medium-font-size\">Server-side attacks seek to compromise and breach the data and applications that are present on a server.<br>Server-side attack target web server for downloading or viewing files like scripts, web shells, configuration files without proper authorization. Most of the time server-side attacks don&#8217;t require user interaction. These attacks can be used with web servers. We can also use them against a normal computer that people use every day. Some of the server side attacks are like RCE, Shell Uploading, RFI..etc.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\n\nIn client-side attacks generally what happens is that an attacker can Mess up with the external part of the website mostly but in the server side the attacker is able to change the code or many internal files.\n\n<\/p>\n\n\n\n<p class=\"has-medium-font-size\">How to start with Web Application Pen-Testing?<\/p>\n\n\n\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Enumeration -&gt; Enumeration -&gt; Enumeration -&gt; Scanning -&gt; Manual testing<\/em><\/strong><\/h4>\n\n\n\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">So how to go for  Enumeration -&gt; Enumeration -&gt; Enumeration <\/p>\n\n\n\n<p class=\"has-medium-font-size\">My way for getting a description of the website is <strong><em>Virustotal<\/em><\/strong><br>Looking for subdomain go for <strong><em>Amass<\/em><\/strong><br>Looking for any OSNIT info go for <strong><em>Spiderfoot<\/em><\/strong><br>Looking for how the application is made using <strong><em>Wappalyzer<\/em><\/strong><br>Check for the Components with known vulnerabilities like check for the server name and version which the site is working on, there might be chances that the server might be vulnerable to some RCE, INJECTIONS \u2026etc<br>Check for Low-level vulnerabilities like SPF, HTTP headers, NO rate limiting \u2026etc<\/p>\n\n\n\n<p class=\"has-medium-font-size\">After that, once the basic enumeration part is done I would like to go for, <br>The medium level and high-level vulnerabilities like XSS, injections, Idor, chain attacks, Privilege escalation..etc.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">So this was my methodology for Web Application pen-testing.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Furthermore, Testing You can go through the Methodology given within the web application hackers handbook.<br> 1) Analyze the application<br> 2) Test for the client side workflow<br> 3)Test the authentication workflow<br> 4)Test for session management<br> 5)Test for Acces controls<br> 6) Test for Input based Vulnerabilities<br> 7)Tests for business login errors<br> 8) Test for privilege escalation <br> 9) Test for Injection attacks<br> 10) Test for server level attacks<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Now let&#8217;s take an example,<\/h4>\n\n\n\n<p class=\"has-medium-font-size\">Suppose there&#8217;s a Login page now, On the basic login page, we will be having a User name and password field, submit button, Forgot password and Terms and services page link.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1004\" height=\"460\" src=\"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/06\/blog-login1.jpg\" alt=\"\" class=\"wp-image-4689\" srcset=\"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/06\/blog-login1.jpg 1004w, https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/06\/blog-login1-300x137.jpg 300w, https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/06\/blog-login1-768x352.jpg 768w, https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/06\/blog-login1-811x372.jpg 811w\" sizes=\"(max-width: 1004px) 100vw, 1004px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><br>Now here the client side attack will be like,<br>There&#8217;s a forgot password section in the login page, if the attacker gets a forgot password link such as <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>https:\/\/xyz.com\/email=ascd@xyz.com&amp;token=aaaasdfgfdhs1232#@$<\/em><\/strong>  <\/p>\n\n\n\n<p class=\"has-medium-font-size\">Now here if the attacker is able to alter the email address and able to reuse the token or if he is successful in carrying out an HTTP pollution attack here, and if he is able to take over the account by this method then this attack can be called as a client-side attack.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Now on the same page, you can see that there is a terms and services field also, can you check the link given there? can we carry try to carry out an RFI (Remote file inclusion) attack there <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><em>https:\/\/xyz.com\/page=terms<\/em><\/strong> <\/p>\n\n\n\n<p class=\"has-medium-font-size\">Suppose if the attacker is able to alter the PAGE parameter and successfully carry out his RFI there then this kind of attack can be called as Server-side attacks<\/p>\n\n\n\n<p class=\"has-medium-font-size\">So this was all about the service side and client side attacks <br>This was all about the web application pen-testing methodology, Do let me know if you need any help in web application pen-testing <br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><em><strong>In the next part<\/strong><\/em>, I would be discussing in deep about the Client-side attacks, ways to carry out an attack, its mitigations..etc<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Hope you like it,<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Till then, Happy Hacking.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hello Guys, Ninad here I hope you are doing good, so today&#8217;s topic is How to start with web application pen-testing. I would be dividing this Web Application Pentesting into 3 parts, Part 1) Methodology. Part 2) Client-side attacks. Part 3) Server-side attacks. In Part 1 Methodology, I would be Sharing my knowledge with you&#8230;<\/p>\n<p><a class=\"read-more\" href=\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\">Read More<\/a><\/p>","protected":false},"author":1,"featured_media":4384,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[40],"tags":[36,37,38,39],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web Application PenTesting Part 1 (Methodology) - Ninad Mathpati<\/title>\n<meta name=\"description\" content=\"Here you would get the information of web application pentesting, How to start with pen-testing? How to report? How to attack? How to mitigate?..etc\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Application PenTesting Part 1 (Methodology) - Ninad Mathpati\" \/>\n<meta property=\"og:description\" content=\"Here you would get the information of web application pentesting, How to start with pen-testing? How to report? How to attack? How to mitigate?..etc\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\" \/>\n<meta property=\"og:site_name\" content=\"Ninad Mathpati\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-30T09:58:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-13T06:29:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/10\/web-pen-testing-mid-1024x684-1-768x513-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"513\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ninad Mathpati\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ninad_mathpati\" \/>\n<meta name=\"twitter:site\" content=\"@ninad_mathpati\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ninad Mathpati\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\"},\"author\":{\"name\":\"Ninad Mathpati\",\"@id\":\"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a\"},\"headline\":\"Web Application PenTesting Part 1 (Methodology)\",\"datePublished\":\"2019-06-30T09:58:16+00:00\",\"dateModified\":\"2020-09-13T06:29:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\"},\"wordCount\":1069,\"commentCount\":8,\"publisher\":{\"@id\":\"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a\"},\"keywords\":[\"#Web Application Security\",\"Client-side Attacks\",\"Pentesting\",\"server-side attacks Enumeration scanning manual testing\"],\"articleSection\":[\"Wep Application Security\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\",\"url\":\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\",\"name\":\"Web Application PenTesting Part 1 (Methodology) - Ninad Mathpati\",\"isPartOf\":{\"@id\":\"https:\/\/ninadmathpati.com\/#website\"},\"datePublished\":\"2019-06-30T09:58:16+00:00\",\"dateModified\":\"2020-09-13T06:29:32+00:00\",\"description\":\"Here you would get the information of web application pentesting, How to start with pen-testing? How to report? How to attack? How to mitigate?..etc\",\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ninadmathpati.com\/#website\",\"url\":\"https:\/\/ninadmathpati.com\/\",\"name\":\"Ninad Mathpati\",\"description\":\"Security Consultant\",\"publisher\":{\"@id\":\"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ninadmathpati.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hi-IN\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a\",\"name\":\"Ninad Mathpati\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\/\/ninadmathpati.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2020\/07\/IMG-1632123.jpg\",\"contentUrl\":\"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2020\/07\/IMG-1632123.jpg\",\"width\":851,\"height\":1093,\"caption\":\"Ninad Mathpati\"},\"logo\":{\"@id\":\"https:\/\/ninadmathpati.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"https:\/\/ninadmathpati.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Application PenTesting Part 1 (Methodology) - Ninad Mathpati","description":"Here you would get the information of web application pentesting, How to start with pen-testing? How to report? How to attack? How to mitigate?..etc","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/","og_locale":"hi_IN","og_type":"article","og_title":"Web Application PenTesting Part 1 (Methodology) - Ninad Mathpati","og_description":"Here you would get the information of web application pentesting, How to start with pen-testing? How to report? How to attack? How to mitigate?..etc","og_url":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/","og_site_name":"Ninad Mathpati","article_published_time":"2019-06-30T09:58:16+00:00","article_modified_time":"2020-09-13T06:29:32+00:00","og_image":[{"width":768,"height":513,"url":"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2019\/10\/web-pen-testing-mid-1024x684-1-768x513-1.jpg","type":"image\/jpeg"}],"author":"Ninad Mathpati","twitter_card":"summary_large_image","twitter_creator":"@ninad_mathpati","twitter_site":"@ninad_mathpati","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Ninad Mathpati","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"5 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/#article","isPartOf":{"@id":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/"},"author":{"name":"Ninad Mathpati","@id":"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a"},"headline":"Web Application PenTesting Part 1 (Methodology)","datePublished":"2019-06-30T09:58:16+00:00","dateModified":"2020-09-13T06:29:32+00:00","mainEntityOfPage":{"@id":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/"},"wordCount":1069,"commentCount":8,"publisher":{"@id":"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a"},"keywords":["#Web Application Security","Client-side Attacks","Pentesting","server-side attacks Enumeration scanning manual testing"],"articleSection":["Wep Application Security"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/","url":"https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/","name":"Web Application PenTesting Part 1 (Methodology) - Ninad Mathpati","isPartOf":{"@id":"https:\/\/ninadmathpati.com\/#website"},"datePublished":"2019-06-30T09:58:16+00:00","dateModified":"2020-09-13T06:29:32+00:00","description":"Here you would get the information of web application pentesting, How to start with pen-testing? How to report? How to attack? How to mitigate?..etc","inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ninadmathpati.com\/hi\/2019\/06\/30\/web-application-pentesting-part-1-methodology\/"]}]},{"@type":"WebSite","@id":"https:\/\/ninadmathpati.com\/#website","url":"https:\/\/ninadmathpati.com\/","name":"Ninad Mathpati","description":"Security Consultant","publisher":{"@id":"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ninadmathpati.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hi-IN"},{"@type":["Person","Organization"],"@id":"https:\/\/ninadmathpati.com\/#\/schema\/person\/f19cd13cb1ebac284a486cd18056766a","name":"Ninad Mathpati","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/ninadmathpati.com\/#\/schema\/person\/image\/","url":"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2020\/07\/IMG-1632123.jpg","contentUrl":"https:\/\/ninadmathpati.com\/wp-content\/uploads\/2020\/07\/IMG-1632123.jpg","width":851,"height":1093,"caption":"Ninad Mathpati"},"logo":{"@id":"https:\/\/ninadmathpati.com\/#\/schema\/person\/image\/"},"sameAs":["https:\/\/ninadmathpati.com"]}]}},"_links":{"self":[{"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/posts\/3922"}],"collection":[{"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/comments?post=3922"}],"version-history":[{"count":3,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/posts\/3922\/revisions"}],"predecessor-version":[{"id":4690,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/posts\/3922\/revisions\/4690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/media\/4384"}],"wp:attachment":[{"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/media?parent=3922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/categories?post=3922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ninadmathpati.com\/hi\/wp-json\/wp\/v2\/tags?post=3922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}