Assinment2 Week3
Assinment2 Week3
Introduction……………………………………………..2
Body……………………………………………………..3
Conclusion………………………………………………
Introduction
In the rapidly evolving field of information security, mastering the fundamentals is essential for success, particularly in the realm of
web application penetration testing. This report provides an overview of a module designed to equip learners with the foundational
knowledge required to understand web requests and their role in web application functionality. Before any effective attacks or security
measures can be implemented, a solid grasp of how web applications operate is imperative.
This module introduces key concepts through practical engagement with two indispensable tools: cURL and Browser DevTools.
These tools are vital for any aspiring web penetration tester, allowing for efficient manipulation and analysis of web requests.
The module also delves into critical topics, including an overview of the HyperText Transfer Protocol (HTTP) and its secure variant,
Hypertext Transfer Protocol Secure (HTTPS). It explores the intricacies of HTTP requests and responses, their headers, and
commonly used HTTP methods such as GET, POST, PUT, and DELETE. Additionally, the module addresses interaction with APIs,
further broadening the learner's skill set in web application security. Through this exploration, the report aims to provide a
comprehensive understanding of the foundational concepts necessary for effective penetration testing and securing web applications.
HTTP is an application-level protocol used to access the World Wide Web resources. The term hypertext stands for text containing links to other
resources and text that the readers can easily interpret.
HTTP communication consists of a client and a server, where the client requests the server for a resource. The server processes the requests and
returns the requested resource. The default port for HTTP communication is port 80, though this can be changed to any other port, depending
on the web server configuration. The same requests are utilized when we use the internet to visit different websites. We enter a Fully Qualified
Domain Name (FQDN) as a Uniform Resource Locator (URL) to reach the desired website, like www.hackthebox.com.