SlideShare a Scribd company logo
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
1/22 
Web Penetration - demo.test
re.net 
th!nkh@ck-hackartist 
cafe.thinkhack.org 
September 29, 2014
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
2/22 
1 Introduction 
What is Penetration Test? 
Test Site 
Progress Phases 
2 Pre-Ready 
Setting Target 
Crawling Target 
3 Exploitation 
Acquiring Sensitive Data 
Directory Listing 
Revealing Souce Codes 
Redirecting to MalSite 
SQL Injection 
Simple SQL Injection 
Advanced SQL Injection 
4 Reporting Vulnerabilities 
Reference Types of Web Attack 
Documentation
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
3/22 
Outline 
1 Introduction 
What is Penetration Test? 
Test Site 
Progress Phases 
2 Pre-Ready 
Setting Target 
Crawling Target 
3 Exploitation 
Acquiring Sensitive Data 
Directory Listing 
Revealing Souce Codes 
Redirecting to MalSite 
SQL Injection 
Simple SQL Injection 
Advanced SQL Injection 
4 Reporting Vulnerabilities 
Reference Types of Web Attack 
Documentation
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
4/22 
What is Penetration Test? 
What is Penetration Test? 
¨Xt¹@ 4Çx?? 
¬Ð X ÄÐ ¹ „| tÄ ”´Ð õ©D ÜÄ Ä  õ©Ð  
è}ü Q)•ñD ÜX” ‘Å 
¨Xt¹ü t¹X (t 
õ© Áü ”Ð t ¬Ð X| ˆ”À ì€ 
tÄ Áü ”| õ©Ä øƒD XÁÐŒ ¬ì¸T Xì 
õtüÈ”À ì€
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
5/22 
Test Site 
Test Site 
ÀŸ$ 
õ©Á : http://demo.test
re.net 
õ©” : tù„Ð ¥ ¨à õ© 
demo.test
re.net Π
m© $… 
‘¬ IBM 
© ¨Xt¹D L¤¸X0  © 
õ©” ù ¬t¸| ¥Xt ¸À J” ”´Ð ‰ 
ù  @‰ ù¬t¸
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
6/22 
Progress Phases 
Progress Phases 
DèÄ 
Á$ 
Á „ $ 
Á„X õ©” $ 
Á¤Ý 
ùX ½° Proxy Äl| t©Xì Crawling D µt ÁX ¤Ýt ¥ 
õ©èÄ 
Á„X ¤Ý ô|   è}D ”!Xà, tù è}Ð t õ©D 
‰ 
¬ì¸èÄ 
õ©èÄÐ ‰ õ©äÐ t m© 8T X” èÄ 
8T m©” õ©…X, õ©½, õ©(· ñt ˆL.
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
7/22 
Outline 
1 Introduction 
What is Penetration Test? 
Test Site 
Progress Phases 
2 Pre-Ready 
Setting Target 
Crawling Target 
3 Exploitation 
Acquiring Sensitive Data 
Directory Listing 
Revealing Souce Codes 
Redirecting to MalSite 
SQL Injection 
Simple SQL Injection 
Advanced SQL Injection 
4 Reporting Vulnerabilities 
Reference Types of Web Attack 
Documentation
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
8/22 
Setting Target 
Setting Target 
Á„ $ 
demo.test
re.netD Á„ $ 
õ©” $ 
demo.test
re.netX Œ¤TÜ ñD À½XÀ J” õ©Ð t demo.test
re.netX 
m© L¤¸| ‰
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
9/22 
Crawling Target 
Burp Suite ä‰ 
ä´Ü  ä‰ 
ä´Ü ¬t¸ : http://portswigger.net/burp/download.html 
ä‰ : java -jar -Xmx1024m burpsuite.jar
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
10/22 
Crawling Target 
Proxy $ 
Proxy $)• 
Internet Explorer 
x075X - œ$ - Proxy $ 
Safari 
Safari - X½$ - à	 - ]Ü $À½ - Web ]Ü $
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
11/22 
Outline 
1 Introduction 
What is Penetration Test? 
Test Site 
Progress Phases 
2 Pre-Ready 
Setting Target 
Crawling Target 
3 Exploitation 
Acquiring Sensitive Data 
Directory Listing 
Revealing Souce Codes 
Redirecting to MalSite 
SQL Injection 
Simple SQL Injection 
Advanced SQL Injection 
4 Reporting Vulnerabilities 
Reference Types of Web Attack 
Documentation
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
12/22 
Acquiring Sensitive Data 
Acquiring Sensitive Data 
/admin/clients.xls | Á üXì ä´Ü| ÜÄ
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
13/22 
Acquiring Sensitive Data 
Clients Information 
ä´Ü @
|D ôŒ ¥
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
14/22 
Directory Listing 
Directory Listing 
/bank 	 ¬Ð default.aspx
|t ÆL 
Directory Listing 5XD Æ`| X”p, $XÀ JXL. 
aspx.cs @ @ Œ¤
|Ä ¬¤à ˆLD L  ˆL. 
aspx.cs @ @ Œ¤
|D Á }0 ˆ¥h.
Introduction Pre-Ready Exploitation Reporting Vulnerabilities 
15/22 
Revealing Souce Codes 
content

More Related Content

Similar to Web penetration

Automatic detction of web apps vulnerability
Automatic detction of web apps vulnerabilityAutomatic detction of web apps vulnerability
Automatic detction of web apps vulnerability
임채호 박사님
 
Web Security
Web SecurityWeb Security
Web Security
Chatree Kunjai
 
Attacks1
Attacks1Attacks1
SQL Server Security - Attack
SQL Server Security - Attack SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
 
Sql Injection V.2
Sql Injection V.2Sql Injection V.2
Sql Injection V.2
Tjylen Veselyj
 
OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
Minor Mistakes In Web Portals
Minor Mistakes In Web PortalsMinor Mistakes In Web Portals
Minor Mistakes In Web Portals
msobiegraj
 
Admin Tech Ed Presentation Hardening Sql Server
Admin Tech Ed Presentation   Hardening Sql ServerAdmin Tech Ed Presentation   Hardening Sql Server
Admin Tech Ed Presentation Hardening Sql Server
rsnarayanan
 
Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
Marco Morana
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Ajith Kp
 
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Quek Lilian
 
Improving web application security, part ii
Improving web application security, part iiImproving web application security, part ii
Improving web application security, part ii
Kangkan Goswami
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
Daniel Owens
 
Attques web
Attques webAttques web
Attques web
Tarek MOHAMED
 
nCircle Webinar: Get your Black Belt
nCircle Webinar: Get your Black Belt nCircle Webinar: Get your Black Belt
nCircle Webinar: Get your Black Belt
nCircle - a Tripwire Company
 
Understanding and preventing sql injection attacks
Understanding and preventing sql injection attacksUnderstanding and preventing sql injection attacks
Understanding and preventing sql injection attacks
Kevin Kline
 
Attackers Vs Programmers
Attackers Vs ProgrammersAttackers Vs Programmers
Attackers Vs Programmers
robin_bene
 
Java EE Web Security By Example: Frank Kim
Java EE Web Security By Example: Frank KimJava EE Web Security By Example: Frank Kim
Java EE Web Security By Example: Frank Kim
jaxconf
 
ieee
ieeeieee
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
Alert Logic
 

Similar to Web penetration (20)

Automatic detction of web apps vulnerability
Automatic detction of web apps vulnerabilityAutomatic detction of web apps vulnerability
Automatic detction of web apps vulnerability
 
Web Security
Web SecurityWeb Security
Web Security
 
Attacks1
Attacks1Attacks1
Attacks1
 
SQL Server Security - Attack
SQL Server Security - Attack SQL Server Security - Attack
SQL Server Security - Attack
 
Sql Injection V.2
Sql Injection V.2Sql Injection V.2
Sql Injection V.2
 
OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
 
Minor Mistakes In Web Portals
Minor Mistakes In Web PortalsMinor Mistakes In Web Portals
Minor Mistakes In Web Portals
 
Admin Tech Ed Presentation Hardening Sql Server
Admin Tech Ed Presentation   Hardening Sql ServerAdmin Tech Ed Presentation   Hardening Sql Server
Admin Tech Ed Presentation Hardening Sql Server
 
Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
 
Improving web application security, part ii
Improving web application security, part iiImproving web application security, part ii
Improving web application security, part ii
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
Attques web
Attques webAttques web
Attques web
 
nCircle Webinar: Get your Black Belt
nCircle Webinar: Get your Black Belt nCircle Webinar: Get your Black Belt
nCircle Webinar: Get your Black Belt
 
Understanding and preventing sql injection attacks
Understanding and preventing sql injection attacksUnderstanding and preventing sql injection attacks
Understanding and preventing sql injection attacks
 
Attackers Vs Programmers
Attackers Vs ProgrammersAttackers Vs Programmers
Attackers Vs Programmers
 
Java EE Web Security By Example: Frank Kim
Java EE Web Security By Example: Frank KimJava EE Web Security By Example: Frank Kim
Java EE Web Security By Example: Frank Kim
 
ieee
ieeeieee
ieee
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 

More from Jongseok Choi

Hyperledger 구조 분석
Hyperledger 구조 분석Hyperledger 구조 분석
Hyperledger 구조 분석
Jongseok Choi
 
Blockchain trends and research
Blockchain trends and researchBlockchain trends and research
Blockchain trends and research
Jongseok Choi
 
블록체인 개요
블록체인 개요블록체인 개요
블록체인 개요
Jongseok Choi
 
Bitcoin and Ethereum
Bitcoin and EthereumBitcoin and Ethereum
Bitcoin and Ethereum
Jongseok Choi
 
Effective Go
Effective GoEffective Go
Effective Go
Jongseok Choi
 
oneM2M security summary
oneM2M security summaryoneM2M security summary
oneM2M security summary
Jongseok Choi
 
Case Study on Intelligent IoT Platform
Case Study on Intelligent IoT PlatformCase Study on Intelligent IoT Platform
Case Study on Intelligent IoT Platform
Jongseok Choi
 
oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and security
Jongseok Choi
 
IoT Introduction and Security
IoT Introduction and SecurityIoT Introduction and Security
IoT Introduction and Security
Jongseok Choi
 
Gitlab.key
Gitlab.keyGitlab.key
Gitlab.key
Jongseok Choi
 
Usage of GDB
Usage of GDBUsage of GDB
Usage of GDB
Jongseok Choi
 
Basic of Exploitation
Basic of ExploitationBasic of Exploitation
Basic of Exploitation
Jongseok Choi
 
Svn
SvnSvn
Trend briefs security
Trend briefs securityTrend briefs security
Trend briefs security
Jongseok Choi
 
Web hacking 개요
Web hacking 개요Web hacking 개요
Web hacking 개요
Jongseok Choi
 
Forensic 2
Forensic 2Forensic 2
Forensic 2
Jongseok Choi
 

More from Jongseok Choi (16)

Hyperledger 구조 분석
Hyperledger 구조 분석Hyperledger 구조 분석
Hyperledger 구조 분석
 
Blockchain trends and research
Blockchain trends and researchBlockchain trends and research
Blockchain trends and research
 
블록체인 개요
블록체인 개요블록체인 개요
블록체인 개요
 
Bitcoin and Ethereum
Bitcoin and EthereumBitcoin and Ethereum
Bitcoin and Ethereum
 
Effective Go
Effective GoEffective Go
Effective Go
 
oneM2M security summary
oneM2M security summaryoneM2M security summary
oneM2M security summary
 
Case Study on Intelligent IoT Platform
Case Study on Intelligent IoT PlatformCase Study on Intelligent IoT Platform
Case Study on Intelligent IoT Platform
 
oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and security
 
IoT Introduction and Security
IoT Introduction and SecurityIoT Introduction and Security
IoT Introduction and Security
 
Gitlab.key
Gitlab.keyGitlab.key
Gitlab.key
 
Usage of GDB
Usage of GDBUsage of GDB
Usage of GDB
 
Basic of Exploitation
Basic of ExploitationBasic of Exploitation
Basic of Exploitation
 
Svn
SvnSvn
Svn
 
Trend briefs security
Trend briefs securityTrend briefs security
Trend briefs security
 
Web hacking 개요
Web hacking 개요Web hacking 개요
Web hacking 개요
 
Forensic 2
Forensic 2Forensic 2
Forensic 2
 

Recently uploaded

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 

Recently uploaded (20)

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 

Web penetration

  • 1. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 1/22 Web Penetration - demo.test
  • 3. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 2/22 1 Introduction What is Penetration Test? Test Site Progress Phases 2 Pre-Ready Setting Target Crawling Target 3 Exploitation Acquiring Sensitive Data Directory Listing Revealing Souce Codes Redirecting to MalSite SQL Injection Simple SQL Injection Advanced SQL Injection 4 Reporting Vulnerabilities Reference Types of Web Attack Documentation
  • 4. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 3/22 Outline 1 Introduction What is Penetration Test? Test Site Progress Phases 2 Pre-Ready Setting Target Crawling Target 3 Exploitation Acquiring Sensitive Data Directory Listing Revealing Souce Codes Redirecting to MalSite SQL Injection Simple SQL Injection Advanced SQL Injection 4 Reporting Vulnerabilities Reference Types of Web Attack Documentation
  • 5. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 4/22 What is Penetration Test? What is Penetration Test? ¨Xt¹@ 4Çx?? ¬Ð X ÄÐ ¹ „| tÄ ”´Ð õ©D ÜÄ Ä õ©Ð è}ü Q)•ñD ÜX” ‘Å ¨Xt¹ü t¹X (t õ© Áü ”Ð t ¬Ð X| ˆ”À ì€ tÄ Áü ”| õ©Ä øƒD XÁÐŒ ¬ì¸T Xì õtüÈ”À ì€
  • 6. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 5/22 Test Site Test Site ÀŸ$ õ©Á : http://demo.test
  • 7. re.net õ©” : tù„Ð ¥ ¨à õ© demo.test
  • 8. re.net Œ m© $… ‘¬ IBM © ¨Xt¹D L¤¸X0 © õ©” ù ¬t¸| ¥Xt ¸À J” ”´Ð ‰ ù @‰ ù¬t¸
  • 9. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 6/22 Progress Phases Progress Phases DèÄ Á$ Á „ $ Á„X õ©” $ Á¤Ý ùX ½° Proxy Äl| t©Xì Crawling D µt ÁX ¤Ýt ¥ õ©èÄ Á„X ¤Ý ô|   è}D ”!Xà, tù è}Ð t õ©D ‰ ¬ì¸èÄ õ©èÄÐ ‰ õ©äÐ t m© 8T X” èÄ 8T m©” õ©…X, õ©½, õ©(· ñt ˆL.
  • 10. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 7/22 Outline 1 Introduction What is Penetration Test? Test Site Progress Phases 2 Pre-Ready Setting Target Crawling Target 3 Exploitation Acquiring Sensitive Data Directory Listing Revealing Souce Codes Redirecting to MalSite SQL Injection Simple SQL Injection Advanced SQL Injection 4 Reporting Vulnerabilities Reference Types of Web Attack Documentation
  • 11. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 8/22 Setting Target Setting Target Á„ $ demo.test
  • 12. re.netD Á„ $ õ©” $ demo.test
  • 13. re.netX Œ¤TÜ ñD À½XÀ J” õ©Ð t demo.test
  • 15. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 9/22 Crawling Target Burp Suite ä‰ ä´Ü ä‰ ä´Ü ¬t¸ : http://portswigger.net/burp/download.html ä‰ : java -jar -Xmx1024m burpsuite.jar
  • 16. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 10/22 Crawling Target Proxy $ Proxy $)• Internet Explorer x075X - œ$ - Proxy $ Safari Safari - X½$ - à - ]Ü $À½ - Web ]Ü $
  • 17. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 11/22 Outline 1 Introduction What is Penetration Test? Test Site Progress Phases 2 Pre-Ready Setting Target Crawling Target 3 Exploitation Acquiring Sensitive Data Directory Listing Revealing Souce Codes Redirecting to MalSite SQL Injection Simple SQL Injection Advanced SQL Injection 4 Reporting Vulnerabilities Reference Types of Web Attack Documentation
  • 18. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 12/22 Acquiring Sensitive Data Acquiring Sensitive Data /admin/clients.xls | Á üXì ä´Ü| ÜÄ
  • 19. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 13/22 Acquiring Sensitive Data Clients Information ä´Ü @
  • 21. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 14/22 Directory Listing Directory Listing /bank  ¬Ð default.aspx
  • 22. |t ÆL Directory Listing 5XD Æ`| X”p, $XÀ JXL. aspx.cs @ @ Œ¤
  • 23. |Ä ¬¤à ˆLD L ˆL. aspx.cs @ @ Œ¤
  • 24. |D Á }0 ˆ¥h.
  • 25. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 15/22 Revealing Souce Codes content
  • 26. |ø0 À½ €„X ˜tÀX ))•t URL
  • 27. |ø0 ì include )Ý„D ”!` ˆL. /default.aspx?content=)`˜tÀ l1´ ˆL. contentX
  • 29. |D }´ $” ƒD ÜÄh. txt@ htm
  • 30.
  • 31. TÁ ” ƒD L ˆL.
  • 32. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 16/22 Revealing Souce Codes null-byte injection aspx.cs
  • 34. | t0 t null-byte injectionD ¬© ?content=login.aspx.cs%00.txt Ðì@ hØ ù¬t¸X
  • 36. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 17/22 Revealing Souce Codes Directory Traversal
  • 37. |½ /static/login.aspx.cs À ƒD L ˆL. Á  ¬ tÙXì bank  ¬X
  • 38. |D )t|h. static  ¬| 0 Xì Á½X login.aspx.cs| …% (static/)../bank/login.aspx.cs | content
  • 40. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 18/22 Redirecting to MalSite Redirecting to MalSite Crawling Ð L ˆït disclaimer.htm
  • 42. |ø0 ì üŒ ¬ät D tüà ˆL. tð ½° url
  • 43. |ø0X Ð t EX ¬t¸xÀ €D pÐ|h. Tt@ ¬
  • 44. ¬Ð õtü” €0¥ p¨¬t¸Ð” €D õXÀ JL.
  • 45. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 19/22 SQL Injection Form Injection øx TtÐ èXŒ SQL InjectionD ÜÄh. ID@ (¤ÌÜÐ ' or '1'='1 D ½… ¬ Ä øx” ƒD Ux
  • 46. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 20/22 SQL Injection Cookie Injection ¬ Ä øx È”p account detailÐ D4ôÄ Æ” ƒD L ˆL. Proxy 4D t©Xì account ô| »´¼ ˆD Ì è ˆDÀ €  amUserId | „X À½Xt Account ô À½(D L ˆL ¨à Account ô| »0 t amUserId
  • 48. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 21/22 SQL Injection Account Information ¨à account ©]t ˜$p, ôŒÄ ¥
  • 49. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 22/22 SQL Injection Union Injection Union InjectionD µt Account ô àÐ øx ID/PW| »D ˆL. login.aspx.cs Œ¤TÜ| „Xì ¬© ô| ¬X” Ltt„ü DÜ…D LDÄ 1 union select username,password from users | ½…
  • 50. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 23/22 Outline 1 Introduction What is Penetration Test? Test Site Progress Phases 2 Pre-Ready Setting Target Crawling Target 3 Exploitation Acquiring Sensitive Data Directory Listing Revealing Souce Codes Redirecting to MalSite SQL Injection Simple SQL Injection Advanced SQL Injection 4 Reporting Vulnerabilities Reference Types of Web Attack Documentation
  • 51. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 24/22 Reference Types of Web Attack Reference Types of Web Attack ôà ‘1X 0 ôà| ‘1X0 t” ‘1 0t ˆ´| h. ù „|Д t 0t ” ƒt OWASP Top 10, CWE/SANS Top 25 t x ôà| ‘1X0 |𤠈L. OWASP Top 10 3Dü0 1àXà ˆp, OWASP|” pÁÐ ùÐ Ý` ˆ” 10 è}D Xà ˆL. CWE/SANS Top 25 CWE@ SANS õ٠ĉX” ƒ Œ¸è´ õµ„|Ð Ý` ˆ” è}D ôàXà ˆL. ¬” 2011D „t ¥à „„.
  • 52. Introduction Pre-Ready Exploitation Reporting Vulnerabilities 25/22 Documentation Documentation 8T€? 8T” ^Ð ‰ „ õ©D 8Ð ø .0” ƒ„. ¨Xt¹Ð ¥ ” €„ ^Ð ‰ õ©äD ¨P 0 XÀ J”ät EXx t¹ü Ù|h. 8T ´© õ©…X õ©½ õ©Ð ¬© Request ô Q)• ø x 0À¬m