XSS happens when a website lets you input data that it then shows to other users without checking if it's safe. For example, if you can insert code (like JavaScript) into a search box or a comment section, and it runs when someone else views the page, that’s an XSS vulnerability.
How to test for XSS:
<script>alert('XSS');</script>
into input fields (search boxes, comment sections, etc.).How to find it:
SQLi is when a website’s database is not secured, and an attacker can insert harmful SQL commands to access sensitive information like usernames, passwords, or even take control of the database.
How to test for SQL Injection:
'
in form fields (login, registration, search).SQL syntax error
or weird messages, the site might be vulnerable.admin' OR '1'='1
to see if you can bypass login pages.How to find it:
This occurs when an attacker can log in without needing valid credentials or can take over other users’ accounts.
How to test for broken authentication:
How to find it:
IDOR happens when a website gives you direct access to an object or information that you shouldn’t be able to see. For example, if changing a URL lets you see another user’s data.
How to test for IDOR:
?id=123
or ?user=456
, try changing those numbers to something else, like ?id=124
or ?user=789
. If you see someone else’s data, the site is vulnerable to IDOR.How to find it:
These happen when a site is not set up properly. For example, when sensitive files are accidentally made public or default configurations are not changed.
How to test for security misconfigurations:
/admin
, /config.php
, or /backup.zip
by typing these URLs after the domain.How to find it:
Start Small: Begin with small, simple tests like trying XSS in search fields or checking if the site handles inputs correctly.
Gather Information: Explore the website thoroughly. Try every form, button, and link to see how the site behaves.
Test Using Different Inputs: Once you find a form or a field, try putting different kinds of inputs like:
'
, "
, <
, >
)' OR 1=1 --
)Automate with Tools: Tools like Burp Suite and SQLmap can help you automate these tests, making it easier to find vulnerabilities faster.
Once you find a vulnerability, HackerOne will ask you to submit a report. The report should be detailed, including: