Skip to content

Latest commit

 

History

History
122 lines (94 loc) · 3.99 KB

File metadata and controls

122 lines (94 loc) · 3.99 KB

Web Application Security Assessment: Assessing Common Web Vulnerabilities

Introduction

Web applications are common targets for attackers due to the critical data they handle and their accessibility over the internet. This project will guide you through a web application security assessment, focusing on identifying common vulnerabilities. You will use various tools to scan, analyze, and secure your web applications.

Pre-requisites

  • Basic understanding of web application concepts (HTTP, HTTPS, HTML, etc.)
  • Familiarity with the Linux command line
  • A computer with a Linux operating system (preferably Ubuntu)
  • Internet connection to download necessary tools

Lab Setup and Tools

  • Lab Environment: A virtual machine or a physical server hosting a web application.
  • Tools:
    • OWASP ZAP (Zed Attack Proxy)
    • Burp Suite
    • Nikto
    • SQLMap
    • Wapiti

Exercises

Exercise 1: Intercepting Traffic with OWASP ZAP

Objective: Use OWASP ZAP to intercept and analyze HTTP/HTTPS traffic.

Steps:

  1. Install OWASP ZAP:

    sudo apt-get update
    sudo apt-get install zaproxy
  2. Configure Browser to Use ZAP Proxy:

    • Open OWASP ZAP.
    • Set the browser proxy settings to use ZAP (default is 127.0.0.1:8080).
  3. Intercept and Analyze Traffic:

    • Navigate to the web application using the configured browser.
    • Observe and analyze the intercepted requests and responses in ZAP.

Expected Output:

  • Detailed view of HTTP/HTTPS traffic between the browser and the web application.

Exercise 2: Vulnerability Scanning with Burp Suite

Objective: Use Burp Suite to scan the web application for vulnerabilities.

Steps:

  1. Install Burp Suite:

    sudo apt-get install burpsuite
  2. Configure Browser to Use Burp Proxy:

    • Open Burp Suite.
    • Set the browser proxy settings to use Burp (default is 127.0.0.1:8080).
  3. Run a Vulnerability Scan:

    • Navigate to the "Scanner" tab in Burp Suite.
    • Add the web application URL to the scan queue.
    • Start the scan and review the results.

Expected Output:

  • Report detailing identified vulnerabilities and their severity.

Exercise 3: Web Server Assessment with Nikto

Objective: Assess the web server for common vulnerabilities using Nikto.

Steps:

  1. Install Nikto:

    sudo apt-get install nikto
  2. Scan the Web Server:

    nikto -h http://192.168.1.10
    • Replace 192.168.1.10 with the IP address of the target web server.

Expected Output:

  • Report detailing potential vulnerabilities, misconfigurations, and other issues with the web server.

Exercise 4: SQL Injection Testing with SQLMap

Objective: Use SQLMap to test the web application for SQL injection vulnerabilities.

Steps:

  1. Install SQLMap:

    sudo apt-get install sqlmap
  2. Identify a Vulnerable Parameter:

    • Use the web application and identify a parameter that could be vulnerable to SQL injection (e.g., http://192.168.1.10/index.php?id=1).
  3. Test for SQL Injection:

    sqlmap -u "http://192.168.1.10/index.php?id=1" --batch --dbs

Expected Output:

  • Identification of SQL injection vulnerabilities and the ability to list databases.

Exercise 5: Web Application Fuzzing with Wapiti

Objective: Use Wapiti to fuzz the web application and identify potential vulnerabilities.

Steps:

  1. Install Wapiti:

    sudo apt-get install wapiti
  2. Run a Fuzzing Scan:

    wapiti http://192.168.1.10 -f txt -o wapiti_report.txt
    • Replace http://192.168.1.10 with the URL of the web application.

Expected Output:

  • Report detailing potential vulnerabilities found through fuzzing.

Conclusion

By completing these exercises, you have learned how to identify and assess common web application vulnerabilities using various tools. These skills are essential for securing web applications and protecting sensitive data from cyber threats.