HTTP ব্যাসিক থেকে শুরু করে SQL Injection, XSS, CSRF, SSRF, Authentication Bypass — Web Security-তে যা যা দরকার সব এক জায়গায়।From HTTP basics to SQL Injection, XSS, CSRF, SSRF, Authentication Bypass — everything you need for Web Security in one place.
একটি web application মূলত তিনটি স্তরে কাজ করে — Frontend (Browser), Backend (Server) এবং Database। প্রতিটি স্তরে আলাদা আলাদা দুর্বলতা থাকতে পারে।A web application works in three layers — Frontend (Browser), Backend (Server), and Database. Each layer can have its own vulnerabilities.
Browser (Client) Web Server (Backend) Database ┌─────────────────┐ ┌──────────────────────┐ ┌──────────────┐ │ │ HTTP │ │ SQL │ │ │ HTML/CSS/JS │ ──────► │ PHP / Python / Node │ ───► │ MySQL │ │ (User দেখে) │ ◄────── │ (Logic চলে) │ ◄─── │ PostgreSQL │ │ │ Response│ │ Data │ MongoDB │ └─────────────────┘ └──────────────────────┘ └──────────────┘ ↑ ↑ ↑ XSS, CSRF SQLi, SSRF, RCE SQL Injection Clickjacking Path Traversal Data Breach
Reconnaissance → Scanning → Exploitation → Post-Exploit তথ্য সংগ্রহ দুর্বলতা খোঁজা আক্রমণ করা Data চুরি whois Nikto SQLmap Data dump subfinder Gobuster Burp Suite Shell upload Google Dork Nmap Manual XSS Pivot Shodan FFUF Hydra Persist
| Method | কাজPurpose | নিরাপত্তা ঝুঁকিSecurity Risk | মাত্রাSeverity |
|---|---|---|---|
| GET | ডেটা পাওয়াRetrieve data | URL-এ data দেখা যায় (password!)Data visible in URL (password!) | MEDIUM |
| POST | ডেটা পাঠানোSend data | CSRF আক্রমণ সম্ভবattack possible | MEDIUM |
| PUT | ফাইল আপলোড/আপডেটFile upload/update | Webshell upload সম্ভবWebshell upload possible | CRITICAL |
| DELETE | ডেটা মুছাDelete data | Data destructionData destruction | HIGH |
| OPTIONS | Allowed methods দেখাView allowed methods | Attack surface revealReveals attack surface | LOW |
| TRACE | Request echoRequest echo | XST (Cross-Site Tracing) | MEDIUM |
200 OK — সফল, কিছু পাওয়া গেছেSuccess, found something301/302 — Redirect (Open Redirect দেখোCheck for Open Redirect)401 — Unauthorized (Auth লাগবেAuth required)403 — Forbidden (Bypass চেষ্টা করো!Try to bypass!)404 — Not Found500 — Server Error (stack trace leak সম্ভবstack trace leak possible)503 — Service Unavailable (DoS?)403 → 403 bypass technique চেষ্টা করো403 → Try 403 bypass techniques500 → Error message-এ info leak?500 → Info leak in error messages?200 on admin → Access control fail!200 on admin → Access control fail!302 redirect → SSRF সম্ভব?302 redirect → SSRF possible?অন্য user-এর data/page access করা। IDOR, privilege escalation। সবচেয়ে সাধারণ দুর্বলতা।Accessing other users' data/pages. IDOR, privilege escalation. Most common vulnerability.
দুর্বল encryption বা plain text-এ sensitive data। MD5, SHA1 হ্যাশ, HTTP-তে password।Weak encryption or sensitive data in plain text. MD5, SHA1 hashes, passwords over HTTP.
SQL Injection, XSS, Command Injection, LDAP Injection। Untrusted data interpreter-এ পাঠানো হলে।SQL Injection, XSS, Command Injection, LDAP Injection. When untrusted data is sent to an interpreter.
Design-এর সময়ই security ভাবা হয়নি। Password reset flaw, business logic error।Security wasn't considered during design. Password reset flaws, business logic errors.
Default password, open S3 bucket, verbose error, directory listing চালু।Default passwords, open S3 buckets, verbose errors, directory listing enabled.
পুরনো version-এর library, framework, plugin ব্যবহার। Log4Shell, Heartbleed।Using outdated libraries, frameworks, plugins. Log4Shell, Heartbleed.
Brute force, weak password, session fixation, broken password reset।Brute force, weak passwords, session fixation, broken password reset.
CI/CD pipeline attack, insecure deserialization, unsigned update।CI/CD pipeline attacks, insecure deserialization, unsigned updates.
Attack log না রাখা। Attack ঘটে গেলে কেউ জানতে পারে না।Not logging attacks. When an attack happens, no one can detect it.
Server-কে দিয়ে internal network-এ request পাঠানো। Cloud metadata চুরি।Making the server send requests to the internal network. Cloud metadata theft.
# Normal Query: SELECT * FROM users WHERE username='admin' AND password='mypassword' # Attacker-এর input: admin'-- SELECT * FROM users WHERE username='admin'--' AND password='anything' ↑ Comment! বাকি query ignore # Result: admin হিসেবে login সফল!
' দিয়ে test করো — error আসলে SQLi সম্ভবStart testing with ' — if error appears, SQLi is possibleAttacker Server Victim 1. Malicious script 3. Script store/reflect 4. Victim visit করে inject করে ───────────► করে ────────────────────► page 5. Script চলে victim-এর 6. Cookie/data ◄──────────────────────────────────────── browser-এ পাঠায় attacker-কে
htmlspecialchars())alert(1) দিয়ে test করোStart testing with alert(1)alg:none সবসময় test করোalways test| বিষয়Topic | কী করতে হবেWhat to Do | গুরুত্বImportance |
|---|---|---|
| SQL Injection | Prepared Statements, ORM | CRITICAL |
| XSS | Output encoding, CSP, HttpOnly cookie | CRITICAL |
| CSRF | CSRF token, SameSite cookie | HIGH |
| Authentication | Strong password, MFA, rate limiting | CRITICAL |
| HTTPS | TLS 1.2+, HSTS header | CRITICAL |
| Session | HttpOnly, Secure, SameSite, short expiry | HIGH |
| Access Control | Check authorization server-side | CRITICAL |
| Error Handling | Generic errors, no stack trace | MEDIUM |
| Dependencies | Update regularly, use Snyk/Dependabot | HIGH |
| Logging | Log all auth events, anomalies | MEDIUM |
' দিয়ে test শুরু, তারপর UNIONStart testing with ', then UNIONalert(1) দিয়ে test, cookie steal করোTest with alert(1), steal cookies| টুলTool | ধরনType | ভালো দিকStrengths | দুর্বল দিকWeaknesses | কখন ব্যবহারWhen to Use |
|---|---|---|---|---|
| Burp Suite CE | Proxy/Scanner | Industry standard, সব featureIndustry standard, all features | Pro তে scanner নেই, ধীর intruderNo scanner in CE, slow intruder | সব সময় প্রথম পছন্দAlways first choice |
| Burp Suite Pro | Proxy/Scanner | Automated scanner, fast intruderAutomated scanner, fast intruder | দামী ($449/year)Expensive ($449/year) | Professional pentestProfessional pentest |
| OWASP ZAP | Proxy/Scanner | Free, open source, auto scanFree, open source, auto scan | Burp-এর চেয়ে কম শক্তিশালীLess powerful than Burp | Automated scan, budget optionAutomated scan, budget option |
| mitmproxy | CLI Proxy | Scripting, automationScripting, automation | GUI নেইNo GUI | Automated interceptionAutomated interception |
| টুলTool | গতিSpeed | বিশেষত্বSpecialty | কখন ব্যবহারWhen to Use |
|---|---|---|---|
| Gobuster | ⭐⭐⭐⭐⭐ | দ্রুত, Golang-basedFast, Golang-based | CTF, quick scanCTF, quick scan |
| FFUF | ⭐⭐⭐⭐⭐ | সব ধরনের fuzzingAll types of fuzzing | Parameter, subdomain, vhost fuzzingParameter, subdomain, vhost fuzzing |
| Dirb | ⭐⭐⭐ | Old but reliableOld but reliable | Basic directory scanBasic directory scan |
| Feroxbuster | ⭐⭐⭐⭐⭐ | Rust-based, recursive | Recursive deep scanRecursive deep scan |
| Dirbuster | ⭐⭐⭐ | GUI, Java-based | Visual scan (beginner)Visual scan (beginner) |
| টুলTool | DetectionDetection | AutomationAutomation | কখন ব্যবহারWhen to Use |
|---|---|---|---|
| SQLmap | ⭐⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ | সব SQL injection — প্রথম পছন্দAll SQL injection — first choice |
| Manual (Burp) | ⭐⭐⭐⭐⭐ | ⭐ | Complex logic, WAF bypassComplex logic, WAF bypass |
| Havij (old) | ⭐⭐⭐ | ⭐⭐⭐⭐ | GUI (আর ব্যবহার করো না)GUI (no longer recommended) |
| NoSQLMap | ⭐⭐⭐⭐ | ⭐⭐⭐⭐ | MongoDB, NoSQL injection |
| Vuln | Tool |
|---|---|
| SQLi | SQLmap, Burp |
| XSS | Burp, XSStrike |
| CSRF | Burp, Manual |
| SSRF | Burp, SSRFmap |
| Dir Scan | Gobuster, FFUF |
| Auth BF | Hydra, Burp Intruder |
| JWT | jwt_tool, hashcat |
| WordPress | WPScan |
| কাজPurpose | Tool |
|---|---|
| WAF | ModSecurity, Cloudflare |
| Header Check | SecurityHeaders.com |
| SSL Check | SSL Labs |
| DAST | OWASP ZAP |
| SAST | SonarQube, Snyk |
| Dependency | Dependabot, OWASP DC |
| Monitoring | Wazuh, ELK Stack |
| Pentest Report | Dradis, Serpico |
| Platform | ধরনType | কার জন্যFor Whom | খরচCost | RatingRating |
|---|---|---|---|---|
| PortSwigger Web Academy | Web Labs | সব স্তরAll levels | Free | ⭐⭐⭐⭐⭐ সেরাBest |
| TryHackMe | Guided | BeginnerBeginner | Free+ | ⭐⭐⭐⭐⭐ |
| HackTheBox | CTF | Intermediate+Intermediate+ | Free+ | ⭐⭐⭐⭐⭐ |
| DVWA | Local Lab | BeginnerBeginner | Free | ⭐⭐⭐⭐ |
| Juice Shop | Local Lab | Modern app practiceModern app practice | Free | ⭐⭐⭐⭐⭐ |
| HackerOne CTF | Real Bug Bounty | AdvancedAdvanced | Free | ⭐⭐⭐⭐⭐ |
| PentesterLab | Labs | Structured learningStructured learning | Free+ | ⭐⭐⭐⭐ |
🕷️ "The web is full of vulnerabilities. Learn to find them before attackers do."
এই ডকুমেন্ট সম্পূর্ণ শিক্ষামূলক উদ্দেশ্যে। সব সময় authorized environment-এ practice করো। This document is entirely for educational purposes. Always practice in authorized environments.
v1.0 — Web Hacking & OWASP Top 10 | Bilingual | Dark/Light Mode