What is the first thing you should do before launching an attack on a web server?
Discover the technology stack in use:
What are common web site enumeration steps?
How would you use ‘curl’ to get robots.txt for google.com?
curl https://www.google.com/robots.txt
What is the open source web server scanner?
Nikto
How would you run Nikto against megacorpone.com for 30 seconds?
nikto -host=http://www.megacorpone.com -maxtime=30s
How can you use Intruder to brute force a phpMyAdmin login page if there is a unique ‘set_session’ value and a ‘token’ value required for each login?
What would be your next action to take after successfully logging into phpMyAdmin console?
Run database SQL queries against user table to find credentials
What allows XSS to take place?
Web application allowing unsanitized data, thereby allowing attackers to inject and potentially execute malicious code.
Stored XSS
Reflected XSS
URL Encoding
HTML Encoding
What is a simple way to see if a web page is sanitizing data, or not?
What is a stealthy alternative to a XSS redirect?
What are the two Cookie flags that are of most interest to an attacker?
- HttpOnly
What does the Secure flag in a Cookie do?
What does the HttpOnly flag in a Cookie do?
How can the capture a victim’s PHPSESSID cookie?
Directory Traversal Vulnerabilities
If we see the end of a URL containing “/menu?file=current_menu.php”…how should we attack this for Directory Traversal Vulnerabilities?
What is a file inclusion vulnerability?
In order to exploit a file inclusion vulnerability, we is required?
- ability to write our shell payload somewhere
How can you exploit LFI using Log Files?
Example LFI using Log File Poisoning?