SlideShare a Scribd company logo
1© Copyright 2014 Coveros, Inc. All rights reserved.
Web Application Security Testing:
Kali Linux Is the Way to Go
Gene Gotimer, Senior Architect
gene.gotimer@coveros.com
2© Copyright 2014 Coveros, Inc. All rights reserved.
 Coveros helps organizations accelerate the delivery of
business value through secure, reliable software
About Coveros
3© Copyright 2014 Coveros, Inc. All rights reserved.
Kali Linux – www.kali.org
 Penetration Testing and Security Auditing Linux
distribution
 New generation of BackTrack Linux
 Debian-based
 Many install options:
– i386, x86_64, ARM
– Android devices
– ISO, VMWare, AMI
– Installed, virtual,
dual boot, live USB
– Metapackages
4© Copyright 2014 Coveros, Inc. All rights reserved.
Not for general use!
 Single user
 Default user is root
– Many of the tools need root anyway
– Live images use toor as default root password
 Not recommended for Linux beginners
– It is a pen testing and security auditing tool
– Easy to mess up the system as root
– Easy to attack your organization from within
 even unintentionally…
5© Copyright 2014 Coveros, Inc. All rights reserved.
6© Copyright 2014 Coveros, Inc. All rights reserved.
Tool Categories
 Information Gathering
 Vulnerability Analysis
 Web Applications
 Password Attacks
 Wireless Attacks
 Exploitation Tools
 Sniffing/Spoofing
 Maintaining Access
 Reverse Engineering
 Stress Testing
 Hardware Hacking
 Forensics
 Reporting Tools
7© Copyright 2014 Coveros, Inc. All rights reserved.
8© Copyright 2014 Coveros, Inc. All rights reserved.
Top 10 Security Tools
 Aircrack-ng
– wireless password cracking
 Burp Suite
– web application proxy and security testing
 THC-Hydra
– network password cracker
 John the Ripper
– Unix and Windows password cracker
 Maltego
– intelligence and forensics
9© Copyright 2014 Coveros, Inc. All rights reserved.
Top 10 Security Tools
 Metasploit Framework
– pentesting and exploitation tool
 Nmap
– network discovery
 OWASP Zed Attack Proxy
– web application scanner and proxy
 sqlmap
– SQL injection detection and exploitation
 Wireshark
– network protocol analyzer
10© Copyright 2014 Coveros, Inc. All rights reserved.
Many more tools
 Hundreds of tools
 Supporting software
– GUI front ends
 Greenbone for OpenVAS
 Armitage for Metaploit
 Zenmap for Nmap
– updaters
 Metasploit
 OpenVAS
 Tools are integrated
– OpenVAS runs Nikto2, Wapiti, Nmap, Arachni
– Metasploit can run OpenVAS
11© Copyright 2014 Coveros, Inc. All rights reserved.
Ways to Use Kali Linux
 Professional Penetration Testing
 Pen test Tool Suite
– Install on a USB drive
– Carry to the client site
– All tools you need are available
 Forensic Information Gathering
– Live boot into forensic mode
– Doesn’t touch internal hard drive
– No auto mount of removable media
 Password Recovery
12© Copyright 2014 Coveros, Inc. All rights reserved.
Ways for non-Pentesters to Use Kali Linux
 Tool catalog
– Browse menus to find tools in any category
 Pre-installed tools
– Try a tool to see if it meets your needs
– Compare tools
 Occasional security tests
– Don’t have time/resources to maintain security testing
environment
 Exploitation software
– Demonstrate vulnerabilities
13© Copyright 2014 Coveros, Inc. All rights reserved.
 VM with very vulnerable apps
 Do not run on production network!
 Training apps
– WebGoat, Damn Vulnerable Web Application
 Realistic, intentionally vulnerable apps
 Old, vulnerable versions of real apps
 Demo apps
 http://code.google.com/p/owaspbwa/
OWASP Broken Web Applications
14© Copyright 2014 Coveros, Inc. All rights reserved.
 Discover hosts on a network
 Find open ports/services on a host
 Fingerprint OS
 Identify service versions
Network Scanners
15© Copyright 2014 Coveros, Inc. All rights reserved.
 Network scanner
– Inventory
– Discovery
– Monitor
 Not a vulnerability scanner
 Variety of scan depths
 Runs in seconds to minutes
Nmap / zenmap
16© Copyright 2014 Coveros, Inc. All rights reserved.
17© Copyright 2014 Coveros, Inc. All rights reserved.
18© Copyright 2014 Coveros, Inc. All rights reserved.
19© Copyright 2014 Coveros, Inc. All rights reserved.
20© Copyright 2014 Coveros, Inc. All rights reserved.
21© Copyright 2014 Coveros, Inc. All rights reserved.
 Web server scanner
– Looks at the server software, e.g., Apache, for
misconfigurations
 Web application scanner
– Looks at the application for vulnerabilities
 XSS
 SQLi
 Command execution
– Fuzzing
 Typically black-box scans
Web Vulnerability Scanner
22© Copyright 2014 Coveros, Inc. All rights reserved.
Nikto2
 Web server scanner
– Not a web application scanner
– Looks at Apache
 command-line tool
– nikto –h 192.168.56.101
 Runs in seconds to minutes, as much as a few
hours
 Report is text-only to the screen
23© Copyright 2014 Coveros, Inc. All rights reserved.
24© Copyright 2014 Coveros, Inc. All rights reserved.
- Nikto v2.1.5
---------------------------------------------------------------------------
+ Target IP: 192.168.56.101
+ Target Hostname: 192.168.56.101
+ Target Port: 80
+ Start Time: 2014-03-01 14:40:40 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache/2.2.14 (Ubuntu) mod_mono/2.4.3 PHP/5.3.2-1ubuntu4.5 with
Suhosin-Patch proxy_html/3.0.1 mod_python/3.3.1 Python/2.6.5 mod_ssl/2.2.14
OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4 Perl/v5.10.1
+ Server leaks inodes via ETags, header found with file /, inode: 289297, size:
26711, mtime: 0x4e2b33fc8f300
+ The anti-clickjacking X-Frame-Options header is not present.
+ OSVDB-3268: /cgi-bin/: Directory indexing found.
+ IP address found in the 'location' header. The IP is "127.0.1.1".
+ OSVDB-630: IIS may reveal its internal or real IP in the Location header via
a request to the /images directory. The value is "http://127.0.1.1/images/".
+ Apache/2.2.14 appears to be outdated (current is at least Apache/2.2.22).
Apache 1.3.42 (final release) and 2.0.64 are also current.
+ mod_ssl/2.2.14 appears to be outdated (current is at least 2.8.31) (may
depend on server version)
+ mod_perl/2.0.4 appears to be outdated (current is at least 2.0.7)
+ mod_mono/2.4.3 appears to be outdated (current is at least 2.8)
Nikto2
25© Copyright 2014 Coveros, Inc. All rights reserved.
+ OpenSSL/0.9.8k appears to be outdated (current is at least 1.0.1c). OpenSSL
0.9.8r is also current.
+ Python/2.6.5 appears to be outdated (current is at least 2.7.3)
+ PHP/5.3.2-1ubuntu4.5 appears to be outdated (current is at least 5.4.4)
+ Perl/v5.10.1 appears to be outdated (current is at least v5.14.2)
+ proxy_html/3.0.1 appears to be outdated (current is at least 3.1.2)
+ mod_ssl/2.2.14 OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4
Perl/v5.10.1 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer
overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082,
OSVDB-756.
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to
XST
+ Retrieved x-powered-by header: PHP/5.3.2-1ubuntu4.5
+ Cookie phpbb2owaspbwa_data created without the httponly flag
+ Cookie phpbb2owaspbwa_sid created without the httponly flag
+ OSVDB-3092: /phpmyadmin/changelog.php: phpMyAdmin is for managing MySQL
databases, and should be protected or limited to authorized hosts.
+ OSVDB-3268: /test/: Directory indexing found.
+ OSVDB-3092: /test/: This might be interesting...
+ OSVDB-3092: /cgi-bin/: This might be interesting... possibly a system shell
found.
+ OSVDB-3268: /icons/: Directory indexing found.
Nikto2
26© Copyright 2014 Coveros, Inc. All rights reserved.
+ OSVDB-3268: /images/: Directory indexing found.
+ OSVDB-3268: /images/?pattern=/etc/*&sort=name: Directory indexing found.
+ Cookie phpMyAdmin created without the httponly flag
+ OSVDB-3233: /icons/README: Apache default file found.
+ Uncommon header 'x-pingback' found, with contents:
http://192.168.56.102/wordpress/xmlrpc.php
+ /wordpress/: A Wordpress installation was found.
+ /phpmyadmin/: phpMyAdmin directory found
+ 6544 items checked: 1 error(s) and 32 item(s) reported on remote host
+ End Time: 2014-03-01 14:41:23 (GMT-5) (43 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Nikto2
27© Copyright 2014 Coveros, Inc. All rights reserved.
Wapiti
 Web application scanner
 Fuzzer
 command-line tool
– wapiti http://192.168.56.101/vicnum/
 Runs in minutes to a few hours
– can get “stuck” on a URL
 Report is text-only to the screen
28© Copyright 2014 Coveros, Inc. All rights reserved.
29© Copyright 2014 Coveros, Inc. All rights reserved.
30© Copyright 2014 Coveros, Inc. All rights reserved.
31© Copyright 2014 Coveros, Inc. All rights reserved.
skipfish
 Web application scanner
 Fuzzer, very fast with dictionaries
 command-line tool
– touch wordlist.wl
– skipfish –o /root/bsc-20140604 
–S /usr/share/skipfish/dictionaries/minimal.wl 
–W wordlist.wl http://192.168.56.101/
 Runs in minutes to hours
– Can be time boxed (-k duration in h:m:s)
 Report is HTML
32© Copyright 2014 Coveros, Inc. All rights reserved.
33© Copyright 2014 Coveros, Inc. All rights reserved.
34© Copyright 2014 Coveros, Inc. All rights reserved.
35© Copyright 2014 Coveros, Inc. All rights reserved.
 Acts as a “man-in-the-middle”
– inspect requests and responses
– modify in-flight
Intercepting Proxy
WebProxy
Web
Browser
Web
Server
36© Copyright 2014 Coveros, Inc. All rights reserved.
OWASP Zed Attack Proxy
 Web application scanner and proxy
 Intercepting proxy
 Fuzzer
 Scanner
 Spider
 GUI interface
 Can generate XML and HTML reports
37© Copyright 2014 Coveros, Inc. All rights reserved.
38© Copyright 2014 Coveros, Inc. All rights reserved.
39© Copyright 2014 Coveros, Inc. All rights reserved.
40© Copyright 2014 Coveros, Inc. All rights reserved.
 Not just find vulnerabilities, exploit them
 Could be a true hacker tool
 Can be used to prove vulnerability is real and can
be exploited
Exploitation Tools
41© Copyright 2014 Coveros, Inc. All rights reserved.
 Metasploit Framework– prove vulnerabilities
– choose and configure exploit
– scan target
– choose and configure payload
– choose encoding technique
– execute exploit
 Armitage– Graphical front end
– launch scan
– suggest exploits
Metasploit / Armitage
42© Copyright 2014 Coveros, Inc. All rights reserved.
43© Copyright 2014 Coveros, Inc. All rights reserved.
44© Copyright 2014 Coveros, Inc. All rights reserved.
45© Copyright 2014 Coveros, Inc. All rights reserved.
46© Copyright 2014 Coveros, Inc. All rights reserved.
 Audit systems
 Track vulnerabilities
 Mark false positives
 Not good one-time scan tools
Vulnerability Management
47© Copyright 2014 Coveros, Inc. All rights reserved.
OpenVAS / Greenbone
 Open-source fork of Nessus
 System vulnerability scanner and manager
 Daily feeds of Network Vulnerability Tests (NVTs)
 Scans scheduled or on-demand
 View results
– by host or by scan
– deltas
 Overrides
– false positives
– backported fixes
48© Copyright 2014 Coveros, Inc. All rights reserved.
49© Copyright 2014 Coveros, Inc. All rights reserved.
50© Copyright 2014 Coveros, Inc. All rights reserved.
51© Copyright 2014 Coveros, Inc. All rights reserved.
52© Copyright 2014 Coveros, Inc. All rights reserved.
 Kali Linux is useful for:
– finding security tools
– trying security tools
– using security tools
www.kali.org
Summary
53© Copyright 2014 Coveros, Inc. All rights reserved.
 Coveros is an ICAgile Member Training Organization (MTO)
with courses accredited by ICAgile.
 By participating in this session, you have started upon the
path to earning internationally recognized Agile Professional
Certifications. This course covers 4 of the more than 400
learning objectives from the ICAgile Learning Roadmap.
 To claim your learning credits, navigate to www.icagile.com
and select link to claim ICAgile learning credits.
 You will need to register and provide the code for this
specific event: BSW14-WSTL
Congratulations!
54© Copyright 2014 Coveros, Inc. All rights reserved.
Gene Gotimer
gene.gotimer@coveros.com
www.coveros.com
@CoverosGene
Questions?

More Related Content

What's hot

PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryGene Gotimer
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityAlert Logic
 
What it feels like to live in a Security Enabled DevOps World
What it feels like to live in a Security Enabled DevOps WorldWhat it feels like to live in a Security Enabled DevOps World
What it feels like to live in a Security Enabled DevOps WorldKarun Chennuri
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsJames '​-- Mckinlay
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Guy Podjarny
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration SecurityDevOps.com
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
 
Security as Code: DOES15
Security as Code: DOES15Security as Code: DOES15
Security as Code: DOES15Ed Bellis
 
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...Richard Bullington-McGuire
 
Experiences Bringing CD to a DoD Project
Experiences Bringing CD to a DoD ProjectExperiences Bringing CD to a DoD Project
Experiences Bringing CD to a DoD ProjectGene Gotimer
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines Abdul_Mujeeb
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & NowCheckmarx
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudAmazon Web Services
 

What's hot (19)

Securing Apache Web Servers
Securing Apache Web ServersSecuring Apache Web Servers
Securing Apache Web Servers
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
What it feels like to live in a Security Enabled DevOps World
What it feels like to live in a Security Enabled DevOps WorldWhat it feels like to live in a Security Enabled DevOps World
What it feels like to live in a Security Enabled DevOps World
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 
Security as Code: DOES15
Security as Code: DOES15Security as Code: DOES15
Security as Code: DOES15
 
DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
 
Experiences Bringing CD to a DoD Project
Experiences Bringing CD to a DoD ProjectExperiences Bringing CD to a DoD Project
Experiences Bringing CD to a DoD Project
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & Now
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the Cloud
 

Similar to Web Application Security Testing: Kali Linux Is the Way to Go

Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsShakacon
 
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...Gonéri Le Bouder
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisTamas K Lengyel
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails applicationclucasKrof
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsxSuman Garai
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Apache web-server-security
Apache web-server-securityApache web-server-security
Apache web-server-securityAndrew Carr
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22MichaelM85042
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdfMAHESHUMANATHGOPALAK
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdfBeratAkit
 

Similar to Web Application Security Testing: Kali Linux Is the Way to Go (20)

Nikto
NiktoNikto
Nikto
 
App armor structure
App armor structureApp armor structure
App armor structure
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysis
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails application
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Apache web-server-security
Apache web-server-securityApache web-server-security
Apache web-server-security
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdf
 

More from Coveros, Inc.

Which Development Metrics Should I Watch?
Which Development Metrics Should I Watch?Which Development Metrics Should I Watch?
Which Development Metrics Should I Watch?Coveros, Inc.
 
10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous Integration10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous IntegrationCoveros, Inc.
 
Increasing Quality with DevOps
Increasing Quality with DevOpsIncreasing Quality with DevOps
Increasing Quality with DevOpsCoveros, Inc.
 
Building Security in Using CI
Building Security in Using CIBuilding Security in Using CI
Building Security in Using CICoveros, Inc.
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery Coveros, Inc.
 
Create Disposable Test Environments with Vagrant and Puppet
Create Disposable Test Environments with Vagrant and Puppet Create Disposable Test Environments with Vagrant and Puppet
Create Disposable Test Environments with Vagrant and Puppet Coveros, Inc.
 
Continuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a Time Continuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a Time Coveros, Inc.
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC) DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC) Coveros, Inc.
 
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...Coveros, Inc.
 
Tests Your Pipeline Might Be Missing
 Tests Your Pipeline Might Be Missing Tests Your Pipeline Might Be Missing
Tests Your Pipeline Might Be MissingCoveros, Inc.
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper Coveros, Inc.
 

More from Coveros, Inc. (11)

Which Development Metrics Should I Watch?
Which Development Metrics Should I Watch?Which Development Metrics Should I Watch?
Which Development Metrics Should I Watch?
 
10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous Integration10 Things You Might Not Know: Continuous Integration
10 Things You Might Not Know: Continuous Integration
 
Increasing Quality with DevOps
Increasing Quality with DevOpsIncreasing Quality with DevOps
Increasing Quality with DevOps
 
Building Security in Using CI
Building Security in Using CIBuilding Security in Using CI
Building Security in Using CI
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
Create Disposable Test Environments with Vagrant and Puppet
Create Disposable Test Environments with Vagrant and Puppet Create Disposable Test Environments with Vagrant and Puppet
Create Disposable Test Environments with Vagrant and Puppet
 
Continuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a Time Continuous Delivery in a Legacy Shop - One Step at a Time
Continuous Delivery in a Legacy Shop - One Step at a Time
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC) DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)
 
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
Compatibility Testing of Your Web Apps - Tips and Tricks for Debugging Locall...
 
Tests Your Pipeline Might Be Missing
 Tests Your Pipeline Might Be Missing Tests Your Pipeline Might Be Missing
Tests Your Pipeline Might Be Missing
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
 

Recently uploaded

AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfMeon Technology
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockSkilrock Technologies
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAlluxio, Inc.
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILNatan Silnitsky
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessWSO2
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandIES VE
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownloadvrstrong314
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 

Recently uploaded (20)

AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 

Web Application Security Testing: Kali Linux Is the Way to Go

  • 1. 1© Copyright 2014 Coveros, Inc. All rights reserved. Web Application Security Testing: Kali Linux Is the Way to Go Gene Gotimer, Senior Architect gene.gotimer@coveros.com
  • 2. 2© Copyright 2014 Coveros, Inc. All rights reserved.  Coveros helps organizations accelerate the delivery of business value through secure, reliable software About Coveros
  • 3. 3© Copyright 2014 Coveros, Inc. All rights reserved. Kali Linux – www.kali.org  Penetration Testing and Security Auditing Linux distribution  New generation of BackTrack Linux  Debian-based  Many install options: – i386, x86_64, ARM – Android devices – ISO, VMWare, AMI – Installed, virtual, dual boot, live USB – Metapackages
  • 4. 4© Copyright 2014 Coveros, Inc. All rights reserved. Not for general use!  Single user  Default user is root – Many of the tools need root anyway – Live images use toor as default root password  Not recommended for Linux beginners – It is a pen testing and security auditing tool – Easy to mess up the system as root – Easy to attack your organization from within  even unintentionally…
  • 5. 5© Copyright 2014 Coveros, Inc. All rights reserved.
  • 6. 6© Copyright 2014 Coveros, Inc. All rights reserved. Tool Categories  Information Gathering  Vulnerability Analysis  Web Applications  Password Attacks  Wireless Attacks  Exploitation Tools  Sniffing/Spoofing  Maintaining Access  Reverse Engineering  Stress Testing  Hardware Hacking  Forensics  Reporting Tools
  • 7. 7© Copyright 2014 Coveros, Inc. All rights reserved.
  • 8. 8© Copyright 2014 Coveros, Inc. All rights reserved. Top 10 Security Tools  Aircrack-ng – wireless password cracking  Burp Suite – web application proxy and security testing  THC-Hydra – network password cracker  John the Ripper – Unix and Windows password cracker  Maltego – intelligence and forensics
  • 9. 9© Copyright 2014 Coveros, Inc. All rights reserved. Top 10 Security Tools  Metasploit Framework – pentesting and exploitation tool  Nmap – network discovery  OWASP Zed Attack Proxy – web application scanner and proxy  sqlmap – SQL injection detection and exploitation  Wireshark – network protocol analyzer
  • 10. 10© Copyright 2014 Coveros, Inc. All rights reserved. Many more tools  Hundreds of tools  Supporting software – GUI front ends  Greenbone for OpenVAS  Armitage for Metaploit  Zenmap for Nmap – updaters  Metasploit  OpenVAS  Tools are integrated – OpenVAS runs Nikto2, Wapiti, Nmap, Arachni – Metasploit can run OpenVAS
  • 11. 11© Copyright 2014 Coveros, Inc. All rights reserved. Ways to Use Kali Linux  Professional Penetration Testing  Pen test Tool Suite – Install on a USB drive – Carry to the client site – All tools you need are available  Forensic Information Gathering – Live boot into forensic mode – Doesn’t touch internal hard drive – No auto mount of removable media  Password Recovery
  • 12. 12© Copyright 2014 Coveros, Inc. All rights reserved. Ways for non-Pentesters to Use Kali Linux  Tool catalog – Browse menus to find tools in any category  Pre-installed tools – Try a tool to see if it meets your needs – Compare tools  Occasional security tests – Don’t have time/resources to maintain security testing environment  Exploitation software – Demonstrate vulnerabilities
  • 13. 13© Copyright 2014 Coveros, Inc. All rights reserved.  VM with very vulnerable apps  Do not run on production network!  Training apps – WebGoat, Damn Vulnerable Web Application  Realistic, intentionally vulnerable apps  Old, vulnerable versions of real apps  Demo apps  http://code.google.com/p/owaspbwa/ OWASP Broken Web Applications
  • 14. 14© Copyright 2014 Coveros, Inc. All rights reserved.  Discover hosts on a network  Find open ports/services on a host  Fingerprint OS  Identify service versions Network Scanners
  • 15. 15© Copyright 2014 Coveros, Inc. All rights reserved.  Network scanner – Inventory – Discovery – Monitor  Not a vulnerability scanner  Variety of scan depths  Runs in seconds to minutes Nmap / zenmap
  • 16. 16© Copyright 2014 Coveros, Inc. All rights reserved.
  • 17. 17© Copyright 2014 Coveros, Inc. All rights reserved.
  • 18. 18© Copyright 2014 Coveros, Inc. All rights reserved.
  • 19. 19© Copyright 2014 Coveros, Inc. All rights reserved.
  • 20. 20© Copyright 2014 Coveros, Inc. All rights reserved.
  • 21. 21© Copyright 2014 Coveros, Inc. All rights reserved.  Web server scanner – Looks at the server software, e.g., Apache, for misconfigurations  Web application scanner – Looks at the application for vulnerabilities  XSS  SQLi  Command execution – Fuzzing  Typically black-box scans Web Vulnerability Scanner
  • 22. 22© Copyright 2014 Coveros, Inc. All rights reserved. Nikto2  Web server scanner – Not a web application scanner – Looks at Apache  command-line tool – nikto –h 192.168.56.101  Runs in seconds to minutes, as much as a few hours  Report is text-only to the screen
  • 23. 23© Copyright 2014 Coveros, Inc. All rights reserved.
  • 24. 24© Copyright 2014 Coveros, Inc. All rights reserved. - Nikto v2.1.5 --------------------------------------------------------------------------- + Target IP: 192.168.56.101 + Target Hostname: 192.168.56.101 + Target Port: 80 + Start Time: 2014-03-01 14:40:40 (GMT-5) --------------------------------------------------------------------------- + Server: Apache/2.2.14 (Ubuntu) mod_mono/2.4.3 PHP/5.3.2-1ubuntu4.5 with Suhosin-Patch proxy_html/3.0.1 mod_python/3.3.1 Python/2.6.5 mod_ssl/2.2.14 OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4 Perl/v5.10.1 + Server leaks inodes via ETags, header found with file /, inode: 289297, size: 26711, mtime: 0x4e2b33fc8f300 + The anti-clickjacking X-Frame-Options header is not present. + OSVDB-3268: /cgi-bin/: Directory indexing found. + IP address found in the 'location' header. The IP is "127.0.1.1". + OSVDB-630: IIS may reveal its internal or real IP in the Location header via a request to the /images directory. The value is "http://127.0.1.1/images/". + Apache/2.2.14 appears to be outdated (current is at least Apache/2.2.22). Apache 1.3.42 (final release) and 2.0.64 are also current. + mod_ssl/2.2.14 appears to be outdated (current is at least 2.8.31) (may depend on server version) + mod_perl/2.0.4 appears to be outdated (current is at least 2.0.7) + mod_mono/2.4.3 appears to be outdated (current is at least 2.8) Nikto2
  • 25. 25© Copyright 2014 Coveros, Inc. All rights reserved. + OpenSSL/0.9.8k appears to be outdated (current is at least 1.0.1c). OpenSSL 0.9.8r is also current. + Python/2.6.5 appears to be outdated (current is at least 2.7.3) + PHP/5.3.2-1ubuntu4.5 appears to be outdated (current is at least 5.4.4) + Perl/v5.10.1 appears to be outdated (current is at least v5.14.2) + proxy_html/3.0.1 appears to be outdated (current is at least 3.1.2) + mod_ssl/2.2.14 OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4 Perl/v5.10.1 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082, OSVDB-756. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST + Retrieved x-powered-by header: PHP/5.3.2-1ubuntu4.5 + Cookie phpbb2owaspbwa_data created without the httponly flag + Cookie phpbb2owaspbwa_sid created without the httponly flag + OSVDB-3092: /phpmyadmin/changelog.php: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. + OSVDB-3268: /test/: Directory indexing found. + OSVDB-3092: /test/: This might be interesting... + OSVDB-3092: /cgi-bin/: This might be interesting... possibly a system shell found. + OSVDB-3268: /icons/: Directory indexing found. Nikto2
  • 26. 26© Copyright 2014 Coveros, Inc. All rights reserved. + OSVDB-3268: /images/: Directory indexing found. + OSVDB-3268: /images/?pattern=/etc/*&sort=name: Directory indexing found. + Cookie phpMyAdmin created without the httponly flag + OSVDB-3233: /icons/README: Apache default file found. + Uncommon header 'x-pingback' found, with contents: http://192.168.56.102/wordpress/xmlrpc.php + /wordpress/: A Wordpress installation was found. + /phpmyadmin/: phpMyAdmin directory found + 6544 items checked: 1 error(s) and 32 item(s) reported on remote host + End Time: 2014-03-01 14:41:23 (GMT-5) (43 seconds) --------------------------------------------------------------------------- + 1 host(s) tested Nikto2
  • 27. 27© Copyright 2014 Coveros, Inc. All rights reserved. Wapiti  Web application scanner  Fuzzer  command-line tool – wapiti http://192.168.56.101/vicnum/  Runs in minutes to a few hours – can get “stuck” on a URL  Report is text-only to the screen
  • 28. 28© Copyright 2014 Coveros, Inc. All rights reserved.
  • 29. 29© Copyright 2014 Coveros, Inc. All rights reserved.
  • 30. 30© Copyright 2014 Coveros, Inc. All rights reserved.
  • 31. 31© Copyright 2014 Coveros, Inc. All rights reserved. skipfish  Web application scanner  Fuzzer, very fast with dictionaries  command-line tool – touch wordlist.wl – skipfish –o /root/bsc-20140604 –S /usr/share/skipfish/dictionaries/minimal.wl –W wordlist.wl http://192.168.56.101/  Runs in minutes to hours – Can be time boxed (-k duration in h:m:s)  Report is HTML
  • 32. 32© Copyright 2014 Coveros, Inc. All rights reserved.
  • 33. 33© Copyright 2014 Coveros, Inc. All rights reserved.
  • 34. 34© Copyright 2014 Coveros, Inc. All rights reserved.
  • 35. 35© Copyright 2014 Coveros, Inc. All rights reserved.  Acts as a “man-in-the-middle” – inspect requests and responses – modify in-flight Intercepting Proxy WebProxy Web Browser Web Server
  • 36. 36© Copyright 2014 Coveros, Inc. All rights reserved. OWASP Zed Attack Proxy  Web application scanner and proxy  Intercepting proxy  Fuzzer  Scanner  Spider  GUI interface  Can generate XML and HTML reports
  • 37. 37© Copyright 2014 Coveros, Inc. All rights reserved.
  • 38. 38© Copyright 2014 Coveros, Inc. All rights reserved.
  • 39. 39© Copyright 2014 Coveros, Inc. All rights reserved.
  • 40. 40© Copyright 2014 Coveros, Inc. All rights reserved.  Not just find vulnerabilities, exploit them  Could be a true hacker tool  Can be used to prove vulnerability is real and can be exploited Exploitation Tools
  • 41. 41© Copyright 2014 Coveros, Inc. All rights reserved.  Metasploit Framework– prove vulnerabilities – choose and configure exploit – scan target – choose and configure payload – choose encoding technique – execute exploit  Armitage– Graphical front end – launch scan – suggest exploits Metasploit / Armitage
  • 42. 42© Copyright 2014 Coveros, Inc. All rights reserved.
  • 43. 43© Copyright 2014 Coveros, Inc. All rights reserved.
  • 44. 44© Copyright 2014 Coveros, Inc. All rights reserved.
  • 45. 45© Copyright 2014 Coveros, Inc. All rights reserved.
  • 46. 46© Copyright 2014 Coveros, Inc. All rights reserved.  Audit systems  Track vulnerabilities  Mark false positives  Not good one-time scan tools Vulnerability Management
  • 47. 47© Copyright 2014 Coveros, Inc. All rights reserved. OpenVAS / Greenbone  Open-source fork of Nessus  System vulnerability scanner and manager  Daily feeds of Network Vulnerability Tests (NVTs)  Scans scheduled or on-demand  View results – by host or by scan – deltas  Overrides – false positives – backported fixes
  • 48. 48© Copyright 2014 Coveros, Inc. All rights reserved.
  • 49. 49© Copyright 2014 Coveros, Inc. All rights reserved.
  • 50. 50© Copyright 2014 Coveros, Inc. All rights reserved.
  • 51. 51© Copyright 2014 Coveros, Inc. All rights reserved.
  • 52. 52© Copyright 2014 Coveros, Inc. All rights reserved.  Kali Linux is useful for: – finding security tools – trying security tools – using security tools www.kali.org Summary
  • 53. 53© Copyright 2014 Coveros, Inc. All rights reserved.  Coveros is an ICAgile Member Training Organization (MTO) with courses accredited by ICAgile.  By participating in this session, you have started upon the path to earning internationally recognized Agile Professional Certifications. This course covers 4 of the more than 400 learning objectives from the ICAgile Learning Roadmap.  To claim your learning credits, navigate to www.icagile.com and select link to claim ICAgile learning credits.  You will need to register and provide the code for this specific event: BSW14-WSTL Congratulations!
  • 54. 54© Copyright 2014 Coveros, Inc. All rights reserved. Gene Gotimer gene.gotimer@coveros.com www.coveros.com @CoverosGene Questions?