- Kali Linux Web Penetration Testing Cookbook
- Gilberto Nájera Gutiérrez
- 547字
- 2021-07-16 12:53:46
Getting to know web applications on a vulnerable VM
OWASP-bwa contains many web applications, intentionally made vulnerable to the most common attacks. Some of them are focused on the practice of some specific technique while others try to replicate real-world applications that happen to have vulnerabilities.
In this recipe, we will take a tour of our vulnerable_vm and get to know some of the applications it includes.
Getting ready
We need to have our vulnerable_vm running and its network correctly configured. For this book, we will be using 192.168.56.102 as its IP address.
How to do it...
- With vulnerable_vm running, open your Kali Linux host's web browser and go to
http://192.168.56.102
. You will see a list of all applications the server contains: - Let's go to Damn Vulnerable Web Application.
- Use
admin
as a user name andadmin
as a password. We can see a menu on the left; this menu contains links to all the vulnerabilities that we can practice in this application: Brute Force, Command Execution, SQL Injection, and so on. Also, the DVWA Security section is where we can configure the security (or complexity) levels of the vulnerable inputs. - Log out and return to the server's homepage.
- Now we click on OWASP WebGoat.NET. This is a .NET application where we will be able to practice file and code injection attacks, cross-site scripting, and encryption vulnerabilities. It also has a WebGoat Coins Customer Portal that simulates a shopping application and can be used to practice not only the exploitation of vulnerabilities but also their identification.
- Now return to the server's home page.
- Another interesting application included in this virtual machine is BodgeIt, which is a minimalistic version of an online store based on JSP—it has a list of products that we can add to a shopping basket, a search page with advanced options, a registration form for new users, and a login form. There is no direct reference to vulnerabilities; instead, we will need to look for them.
- We won't be able to look at all the applications in a single recipe, but we will be using some of them in this book.
How it works...
The applications in the home page are organized in the following six groups:
- Training applications: These are the ones that have sections dedicated to practice-specific vulnerabilities or attack techniques; some of them include tutorials, explanations, or other kind of guidance.
- Realistic, intentionally vulnerable applications: Applications that act as real-world applications (stores, blogs, and social networks) and are intentionally left vulnerable by their developers for the sake of training.
- Old (vulnerable) versions of real applications: Old versions of real applications, such as WordPress and Joomla are known to have exploitable vulnerabilities; these are useful to test our vulnerability identification skills.
- Applications for testing tools: The applications in this group can be used as a benchmark for automated vulnerability scanners.
- Demonstration pages / small applications: These are small applications that have only one or a few vulnerabilities, for demonstration purposes only.
- OWASP demonstration application: OWASP AppSensor is an interesting application, it simulates a social network and could have some vulnerabilities in it. But it will log any attack attempts, which is useful when trying to learn; for example, how to bypass some security devices such as a web application firewall.
推薦閱讀
- Software Defined Networking with OpenFlow
- The Android Game Developer's Handbook
- Selenium Design Patterns and Best Practices
- FFmpeg入門詳解:音視頻原理及應用
- 零基礎趣學C語言
- 從零開始學Linux編程
- Troubleshooting Citrix XenApp?
- Exploring SE for Android
- 零基礎看圖學ScratchJr:少兒趣味編程(全彩大字版)
- Scala Functional Programming Patterns
- Oracle 12c從入門到精通(視頻教學超值版)
- Python預測分析實戰
- Python繪圖指南:分形與數據可視化(全彩)
- 樹莓派開發從零開始學:超好玩的智能小硬件制作書
- Office VBA開發經典:中級進階卷