AppSecExplained
  • Index < START HERE
    • My courses
    • How to get started from zero
  • 📽️Live Stream Content
    • Resource of the week
  • Discovery / Recon
    • Methodology
    • Content discovery / recon
      • Subdomains
      • Endpoints
      • Parameters
      • Spidering
  • Common vulns
    • SQL injection overview
      • Detection
      • Blind SQLi
      • Second-order SQLi
      • SQLi lab setup & writeups
    • NoSQL injection
    • JavaScript injection (XSS)
      • XSS Methodology
    • File Inclusion
      • Local file inclusion
        • Directory traversal
    • Command injection
    • XXE (XML external entity) injection
      • Blind XXE
    • Template injection
      • Server-side template injection
      • Client-side template injection
    • Authentication
      • Attacking password-based authentication
      • Attacking MFA
      • Authentication lab setup & writeups
    • Cross-Site Request Forgery (CSRF)
    • Insecure deserialization
      • PHP
      • Java
      • Python
      • .NET
    • Server-side request forgery (SSRF)
    • Insecure file upload
    • Clickjacking
    • Open redirect
    • Vulnerable components
    • Race conditions
      • Limit overrun
    • Prototype pollution
      • Client-side prototype pollution
    • APIs
      • API: BOLA
      • API: Broken authentication
      • BOPLA
      • API: BFLA
  • Bypassing controls
    • Rate limiting
    • WAF Bypasses
  • Scripts
    • Docker-compose.yml files
      • Wordpress
      • SQLi testing labs
    • PHP scripts
      • RCE Function Check
    • Wordlists
      • Single characters
      • SQLi
  • Code review
    • Getting started
    • Sinks
  • Links worth your time
    • Practical API Hacking
    • Rana Khalil's Web Security Academy Course
    • Portswigger's Web Security Academy
    • TCM Security Discord
    • PentesterLand Writeups
Powered by GitBook
On this page

Was this helpful?

  1. Code review

Getting started

PreviousSQLiNextSinks

Last updated 3 months ago

Was this helpful?

Coming soon - I'll be putting together a short course on code review :)

Why code review?

Before we dive into why, it's worth mentioning that this section is related to code review with the intent of finding security vulnerabilities and weaknesses within web applications. Not the typical peer review carried out be development teams. If you're interested in code review in general, this is a good place to start . From now on, we'll be looking at code review to support pentesting and security research activities.

There are many benefits to code review, and it's a skill that takes time to build. The main benefits are:

  • Easily spot certain vulnerabilities or weaknesses

    • Hardcoded credentials

    • Weak encryption

    • Insecure libraries or dependencies

  • Find hidden or complex vulnerabilities

  • Find malicious code (e.g. backdoors)

  • Achieve compliance

https://about.gitlab.com/topics/version-control/what-is-code-review/