INE Training Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • INE Training Notes
  • Courses
    • eJPT - PTSv2
      • 📒Penetration Testing Prerequisites
        • Introduction
        • Networking
        • Web Applications
      • 📒1. Assessment Methodologies & Auditing
        • Information Gathering
        • Footprinting & Scanning
        • Enumeration
          • 🔬SMB Enum
          • 🔬FTP Enum
          • 🔬SSH Enum
          • 🔬HTTP Enum
          • 🔬MYSQL Enum
          • 🔬SMTP Enum
        • Vulnerability Assessment
        • Auditing Fundamentals
      • 📒2. Host & Network Penetration Testing
        • System/Host Based Attacks
          • 🪟Windows Attacks
            • 🔬IIS - WebDAV
            • 🔬SMB - PsExec
            • 🔬RDP
            • 🔬WinRM
            • 🔬Win Kernel Privesc
            • 🔬UAC Bypass
            • 🔬Access Token
            • 🔬Alternate Data Stream
            • 🔬Credentials Dumping
          • 🐧Linux Attacks
            • 🔬Bash
            • 🔬FTP
            • 🔬SSH
            • 🔬SAMBA
            • 🔬Cron Jobs
            • 🔬SUID
            • 🔬Hashes Dumping
        • Network Based Attacks
          • 🔬Tshark, ARP, WiFi
        • The Metasploit Framework (MSF)
          • 🔬HFS - MSF Exploit
          • 🔬Tomcat - MSF Exploit
          • 🔬FTP - MSF Exploit
          • 🔬Samba - MSF Exploit
          • 🔬SSH - MSF Exploit
          • 🔬SMTP - MSF Exploit
          • 🔬Meterpreter - MSF
          • 🔬Win Post Exploitation - MSF
          • 🔬Linux Post Exploitation - MSF
        • Exploitation
          • 🔬Fixing Exploits - HFS
          • 🔬Win Workflow Platform - MSF
          • 🔬Win Black Box Pentest
          • 🔬Linux Black Box Pentest
        • Post-Exploitation
          • 🔬Windows Post-Exploitation
          • 🔬Windows Privilege Escalation
          • 🔬Windows Persistence
          • 🔬Linux Post-Exploitation
          • 🔬Linux Privilege Escalation
          • 🔬Linux Persistence
          • 🔬Cracking Hashes
          • 🔬Pivoting
        • Social Engineering
      • 📒3. Web Application Penetration Testing
        • Intro to Web App Pentesting
          • 🔬HTTP Enumeration
          • 🔬Web App Scanning
          • 🔬Web App Attacks
      • 🔬Exam Preparation - Labs
        • PTSv1 Prerequisites Labs
          • 🔬HTTP(S) Traffic Sniffing
          • 🔬Find the Secret Server
          • 🔬Data Exfiltration
          • 🔬Burp Suite Basics - Directory Enumeration
        • PTSv2 Practice Labs
      • 🌐eJPT References
      • 📜eJPT Cheat Sheet
    • ICCA
      • 📒1. Cloud Foundations
      • 📒2. Cloud Management Concepts
      • 📒3. Cloud Identity, Security, and Compliance
      • 🌐Icca References
    • eMAPT
      • 📒Android
      • 📒iOS
      • 🌐eMAPT References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Lab 1 - ZAProxy
  • ZAProxy
  • Lab 2 - Nikto
  • Nikto

Was this helpful?

Edit on GitHub
  1. Courses
  2. eJPT - PTSv2
  3. 📒3. Web Application Penetration Testing
  4. Intro to Web App Pentesting

🔬Web App Scanning

Previous🔬HTTP EnumerationNext🔬Web App Attacks

Last updated 2 years ago

Was this helpful?

Lab 1 -

🔬

  • Target IP: 192.192.29.3

  • Scan and identify a vulnerable web app (bWAPP) with ZAProxy

ip -br -c a
	eth1@if203734  UP  192.192.29.2/24

nmap -sS -sV 192.192.29.3
  • Start owasp-zap from the start menu

    • Use Manual Explore and input the URL

      • http://192.192.29.3/

    • Launch Browser to open the browser session with the ZAP HUB

  • Login to the web app with bee:bug credentials

    • set the security level to low

  • Try some HTML and SQL Injection or other bugs from the https://192.192.29.3/portal.php page

ZAProxy

  • Configure authenticated session in ZAProxy

  • Enable Forced User mode

  • Include in Context the Site https://192.192.29.3/ and confirm with OK

  • Run a Spider attack on the site, select the bee user and Start the scan

  • Run an Active Scan on the site, select the bee user and Start the scan

  • In the Alerts tab check the 🚩High risk Alerts

  • Try to navigate to https://192.192.29.3/htmli_stored.php, inject the XSS (Cross-site Scripting) payload and Submit it

    • The XSS payload will be triggered

  • Using the ZAP HUD, Site Alerts can be accessed. Every vulnerability is clickable and can be directly tried via the URL

  • Try a SQL Injection attack by opening this link

    • http://192.210.141.3/sqli_1.php?action=search&title=ZAP'+OR+'1'%3D'1'+--+

    • The table records will be dumped on the web page

  • Target IP: 192.157.60.3

  • Scan and identify web app vulnerabilities (Multillidae II) with Nikto

    • LFI

ip -br -c a
	eth1@if203734  UP  192.157.60.2/24

nmap -sS -sV 192.157.60.3
  • Open the browser and navigate to

    • http://192.157.60.3/

Nikto

  • In the Bash terminal run nikto and output the results to a file

nikto -h http://192.157.60.3 -o niktoscan-192.157.60.3.txt
  • Scan the target web app for Local File Inclusion (LFI) vulnerability by copying the link from the browser

    • http://192.157.60.3/index.php?page=arbitrary-file-inclusion.php

    • output to an HTML file

nikto -h http://192.157.60.3/index.php?page=arbitrary-file-inclusion.php -Tuning 5 -o nikto.html -Format htm
firefox nikto.html
  • The PHP-Nuke Rocket add-in is vulnerable to file traversal, allowing an attacker to view any file on the host

    • View the contents of the passwd file of the target machine

    • http://192.157.60.3/index.php/index.php?page=../../../../../../../../../../etc/passwd


Lab 2 -

🔬

Nikto
Scanning Web Application with Nikto
ZAProxy
Scanning Web Application with ZAProxy
196 URLs Found
nikto
IDOR - LFI
LFI