🔬Web App Attacks
Last updated
Last updated
🔬 Passive Crawling with Burp Suite
Target IP:
192.230.181.3
Multillidae II
Open the browser and navigate to
http://192.230.181.3/
Activate FoxyProxy
Plugin
Start BurpSuite
(set User options/Display/Look to Darcula and restart BurpSuite)
Intercept the home page request and turn off the intercept
Check the HTTP history
tab
Browse the Multillidae web app and Burp will crawl the visited pages
Check the Target
tab for a Site map
Add site to the Scope
Target IP:
192.42.186.3
bWAPP
Open the browser and navigate to http://192.42.186.3/
, login with bee
:bug
, select SQL Injection (GET/Search)
and click Hack button
Input a string and search
http://192.42.186.3/sqli_1.php?title=hacking&action=search
Activate FoxyProxy
Plugin
Start BurpSuite
in Interception mode
Refresh the page, intercept the request and copy the cookie
Cookie: PHPSESSID=rmoepg39ac0savq89d1k5fu2q1; security_level=0
Run sqlmap
, defining title
as the test parameter
In BurpSuite, send the request to Repeater
Copy the first payload from SQLMap and paste it as part of the title
parameter
Use sqlmap
to get a list of tables for the bWAPP
database
Use sqlmap
to get a list of columns in the users
table of the bWAPP
database
Dump password
and email
for admin from the users
table
Turn off Intercept mode in BurpSuite, navigate to http://192.42.186.3/sqli_6.php
and turn back on Intercept mode.
Search example
string from the page and intercept it
Copy to file the request and name the filerequest`
Use sqlmap
with this request file
In BurpSuite, send the request to Repeater
Try the proposed payloads from SQLMap
Change the request to pass version()
function to the database
Target IP:
192.131.167.3
Multillidae II
Navigate to the XSS Reflected - DNS Lookup webpage:
http://192.131.167.3/index.php?page=dns-lookup.php
Enter any text and Lookup DNS
The value is reflected back on the web page
Activate FoxyProxy
Plugin
Start BurpSuite
Enter any text and Lookup DNS
and intercept the request in BurpSuite
Copy the payload and input XSS
in the target_host
Use xsser
to check the vulnerability
Use a custom XSS payload
Copy the Final Attack
payload and use it in the browser or BurpSuite to trigger the XSS attack
http://192.131.167.3/index.php?page=dns-lookup.php&target_host=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&dns-lookup-php-submit-button=Lookup+DNS
Perform an XSS Poll Question attack over GET
request
http://192.131.167.3/index.php?page=user-poll.php
copy the URL
, replace the nmap
value with XSS
and pass it to XSSer
http://192.131.167.3/index.php?page=user-poll.php&csrf-token=&choice=nmap&initials=2&user-poll-php-submit-button=Submit+Vote
Open the Final Attack
link in the browser
http://192.131.167.3/index.php?page=user-poll.php&csrf-token=&choice=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&initials=2&user-poll-php-submit-button=Submit+Vote
🔬 Authenticated XSS Attack with XSSer
Target IP:
192.56.179.3
bWAPP
Login with bug
:bee
, select the HTML Injection - Reflected (GET)
bug and input any value. Copy the URL
http://192.56.179.3/htmli_get.php?firstname=hi&lastname=hi&form=submit
Activate FoxyProxy
Plugin, start BurpSuite
, refresh the webpage and copy the Cookie
from the Proxy intercepted request
PHPSESSID=lb3rg4q495t9sqph907sdhjgg1; security_level=0
Run the xsser
tool by
replacing the firstname
value string with XSS
feeding the Cookie
stop BurpSuite interceptor
🔬 Attacking HTTP Login Form with Hydra
Target IP:
192.210.201.3
bWAPP
Open the http://192.210.201.3/login.php
page, view source code and check the parameters passed in the login form.
Prepare a usernames and a passwords list
Use hydra
to retrieve the credentials
🔬 Attacking Basic Auth with Burp Suite
Target IP:
192.190.241.3
bWAPP
Open Firefox, activate FoxyProxy
Plugin, start BurpSuite
, open http://192.190.241.3/basic
and intercepted the request. Forward the request, input some data and intercept the request.
/basic
directory uses Basic Auth
send the request to Intruder
Navigate to Intruder - Positions tab
Decode the base64
string, it will become test:test
, like the input data from the login form
Replace the credentials with a parameter to be substituted like §credentials§
In the Payload Options, Load the /root/Desktop/wordlists/100-common-passwords.txt:
list
In the Payload Processing - Add prefix
rule, and input admin:
to append it to all the passwords
Add a Encode - Base64-encode
rule too
Start the attack
Check the entry result with status code 301
Send to Decoder the Authorization: Basic
value
Check the BurpSuite Decoder tab
Decoded as base64 string is admin:cookie1
Turn off BurpSuite interceptor, open the web page and insert the found credentials
🚩 The flag is
d25db4ce54b60b49dfd7b32c52ed8d26
🔬 Attacking HTTP Login Form with ZAProxy
Target IP:
192.145.79.3
bWAPP
Open the owasp-zap
tool, Manual Explore, input the URL and launch browser
http://192.145.79.3
Attempt login with bad credentials. The website will be added to the sitemap inside ZAP
Right click on the POST
request and select Fuzz...
Select the input username, click the Add button, Add again and input the payloads for username. Confirm with OK
Select the input password and do the same thing with a list of possible password
Start Fuzzer to start the attack and check the results and the 302
response