Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools
()
About this ebook
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
In this report I am using a combination of Burp tools to detect and exploit vulnerabilities in Damn Vulnerable Web App (DVWA) with low security. By default, Burp Scanner scans all requests and responses that pass through the proxy. Burp lists any issues that it identifies under Issue activity on the Dashboard. You can also use Burp Scanner to actively audit for vulnerabilities. Scanner sends additional requests and analyzes the application's traffic and behavior to identify issues.
Various examples are outlined in this report for different types of vulnerabilities such as: SQL injection, Cross Site Request Forgery (CSRF), Cross-site scripting, File upload, Local and Remote File Inclusion. I tested various types of penetration testing tools in order to exploit different types of vulnerabilities. The report consists from the following parts:
1. Installing and Configuring BurpSuite
2. BurpSuite Intruder.
3. Installing XMAPP and DVWA App in Windows System.
4. Installing PHP, MySQL, Apache2, Python and DVWA App in Kali Linux.
5. Scanning Kali-Linux and Windows Using .
6. Understanding Netcat, Reverse Shells and Bind Shells.
7. Adding Burps Certificate to Browser.
8. Setting up Target Scope in BurpSuite.
9. Scanning Using BurpSuite.
10. Scan results for SQL Injection Vulnerability with BurpSuite and Using SQLMAP to Exploit the SQL injection.
11. Scan Results for Operating System Command Injection Vulnerability with BurpSuite and Using Commix to Exploit the OS Command Injection.
12. Scan Results for Cross Side Scripting (XSS) Vulnerability with BurpSuite, Using Xserve to exploit XSS Injection and Stealing Web Login Session Cookies through the XSS Injection.
13. Exploiting File Upload Vulnerability.
14: Exploiting Cross Site Request Forgery (CSRF) Vulnerability.
15. Exploiting File Inclusion Vulnerability.
16. References.
Dr. Hidaia Mahmood Alassouli
I am Dr. Hidaia Mahmood Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from Gaza Strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http://www.anticorruption.000space.comI am an Author publishing books on kdp.amazon.comand many other book stores such as Google, Apple.com, writinglife.kobo.com, Lulu.com, feiyr.com, blurb.com, bookrix.com, barnesandnoble.com, notionpress.com, ingramspark.com and others . My personal website: http://www.hidaia-alassouli.000space.comMy Amazon Author Central: https://www.amazon.com/-/e/B07BH5HS7LEmail: hidaia_alassouli@hotmail.com
Read more from Dr. Hidaia Mahmood Alassouli
Evaluation of Some SMS Verification Services and Virtual Credit Cards Services for Online Accounts Verifications Rating: 5 out of 5 stars5/5Introduction to Power System Protection Rating: 5 out of 5 stars5/5Generation of Electrical Power Rating: 5 out of 5 stars5/5Wireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsEvaluation of Some Online Payment Providers Services: Best Online Banks and Visa/Master Cards Issuers Rating: 0 out of 5 stars0 ratingsQuick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services Rating: 0 out of 5 stars0 ratingsControl of DC Motor Using Different Control Strategies Rating: 0 out of 5 stars0 ratingsReactive Power Compensation Rating: 0 out of 5 stars0 ratingsDistribution of Electrical Power: Lecture Notes of Distribution of Electrical Power Course Rating: 0 out of 5 stars0 ratingsElectric Power Transmission: Lecture Notes of Electric Power Transmission Course Rating: 5 out of 5 stars5/5Simulation of Some Power Electronics Case Studies in Matlab Simpowersystem Blockset Rating: 2 out of 5 stars2/5Signal, Audio and Image Processing Rating: 0 out of 5 stars0 ratingsEvaluation of Some Virtual Phone Numbers Services Rating: 0 out of 5 stars0 ratingsMonitoring of Power System Quality Rating: 0 out of 5 stars0 ratingsFootprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Rating: 0 out of 5 stars0 ratingsMethods for Increasing the Quality and Reliability of Power System Using FACTS Devices Rating: 0 out of 5 stars0 ratingsEarning Money: through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsCreation of Postfix Mail Server Based on Virtual Users and Domains Rating: 0 out of 5 stars0 ratingsCreation and Deployment of Smart Contracts on Ethereum Blockchain Rating: 0 out of 5 stars0 ratingsQuick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory Rating: 0 out of 5 stars0 ratingsMethods to Increase the Internal Storage Space of Android Devices Rating: 0 out of 5 stars0 ratingsStarting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus Rating: 0 out of 5 stars0 ratingsCreating EPUB E-books Using EPUB Editors and Converters Rating: 0 out of 5 stars0 ratings
Related to Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools
Related ebooks
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsA Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities Rating: 0 out of 5 stars0 ratingsPractical ASP.NET Web API Rating: 0 out of 5 stars0 ratingsDeveloping Software Installers Rating: 0 out of 5 stars0 ratingsPIC Projects for Non-Programmers Rating: 4 out of 5 stars4/5ETHICAL HACKING GUIDE-Part 3: Comprehensive Guide to Ethical Hacking world Rating: 0 out of 5 stars0 ratingsBug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications Rating: 0 out of 5 stars0 ratingsComputer Productivity Book 3. Use AutoHotKey to License & Deploy Your Scripts to Sell: AutoHotKey productivity, #3 Rating: 0 out of 5 stars0 ratingsThe Browser Hacker's Handbook Rating: 0 out of 5 stars0 ratingsHow to Attack and Defend Your Website Rating: 0 out of 5 stars0 ratingsJavaScript Programming: 3 In 1 Security Design, Expressions And Web Development Rating: 0 out of 5 stars0 ratingsEvaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware Rating: 0 out of 5 stars0 ratingsHacking of Computer Networks: Full Course on Hacking of Computer Networks Rating: 0 out of 5 stars0 ratingsUmbraco User's Guide Rating: 4 out of 5 stars4/5SRS - How to build a Pen Test and Hacking Platform Rating: 2 out of 5 stars2/5Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Rating: 0 out of 5 stars0 ratingsCisco Packet Tracer for Beginners Rating: 5 out of 5 stars5/5Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsHack into your Friends Computer Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsJava: Tips and Tricks to Programming Code with Java: Java Computer Programming, #2 Rating: 0 out of 5 stars0 ratingsJava: Tips and Tricks to Programming Code with Java Rating: 0 out of 5 stars0 ratingsAtomic Kotlin Rating: 0 out of 5 stars0 ratingsPC Computer Security & Backup Guide: How to Secure & Backup Your PC with Antivirus & Malware Software Rating: 0 out of 5 stars0 ratingsFundamentals of Security in the Windows System Rating: 0 out of 5 stars0 ratingsBurp Suite Essentials Rating: 4 out of 5 stars4/5Wordpress Security + Multi-Backups Rating: 0 out of 5 stars0 ratings
Security For You
Hacking For Dummies Rating: 4 out of 5 stars4/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5
Reviews for Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools
0 ratings0 reviews
Book preview
Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools - Dr. Hidaia Mahmood Alassouli
1. Introduction:
Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a java application that can be used to secure or crack web applications. The suite consists of different tools, like a proxy server, a web spider an intruder and a so-called repeater, with which requests can be automated. You can use Burp's automated and manual tools to obtain detailed information about your target applications.
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
In this report I am using a combination of Burp tools to detect and exploit vulnerabilities in Damn Vulnerable Web App (DVWA) with low security. By default, Burp Scanner scans all requests and responses that pass through the proxy. Burp lists any issues that it identifies under Issue activity on the Dashboard. You can also use Burp Scanner to actively audit for vulnerabilities. Scanner sends additional requests and analyzes the application's traffic and behavior to identify issues.
Various examples are outlined in this report for different types of vulnerabilities such as: SQL injection, Cross Site Request Forgery (CSRF), Cross-site scripting, File upload, Local and Remote File Inclusion. I tested various types of penetration testing tools in order to exploit different types of vulnerabilities. The report consists from the following parts:
1. Installing and Configuring BurpSuite
2. BurpSuite Intruder.
3. Installing XMAPP and DVWA App in Windows System.
4. Installing PHP, MySQL, Apache2, Python and DVWA App in Kali Linux.
5. Scanning Kali-Linux and Windows Using .
6. Understanding Netcat, Reverse Shells and Bind Shells.
7. Adding Burps Certificate to Browser.
8. Setting up Target Scope in BurpSuite.
9. Scanning Using BurpSuite.
10. Scan results for SQL Injection Vulnerability with BurpSuite and Using SQLMAP to Exploit the SQL injection.
11. Scan Results for Operating System Command Injection Vulnerability with BurpSuite and Using Commix to Exploit the OS Command Injection.
12. Scan Results for Cross Side Scripting (XSS) Vulnerability with BurpSuite, Using Xserve to exploit XSS Injection and Stealing Web Login Session Cookies through the XSS Injection.
13. Exploiting File Upload Vulnerability.
14: Exploiting Cross Site Request Forgery (CSRF) Vulnerability.
15. Exploiting File Inclusion Vulnerability.
16. References.
2. Installing and Configuring BurpSuite:
a) Installing Community Edition of BurpSuite:
1. Go to official website of BurpSuite.
https://portswigger.net/burp
2. Go to community edition and download BurpSuite for Windows:
https://portswigger.net/burp/communitydownload
3. Install BurpSuite. In the first run burp is going to ask you to accept the terms. Select I agree
.
4. In this page temporary project is the automatic selection because community version of burp suit does not allow you to save project into hard disk.
5. Click next . You can use Burp Defaults
. Or you can load configurations from existing file. I am going to use the Burp defaults.
6. Then I got the following dashboard.
7. From Settings
menu you can choose the display font size.
8. In the Event Log
section, it displays everything that you know burp suit does in background. If any error pops up, then we can certainly identify in the Log section and fix accordingly
9. Let’s understand how proxy works. Click on Proxy
section. Proxy is the essential part of BurpSuite because in the Proxy section we can monitor the requests that you send out from your web browser and the responses that you get back from server’s proxy. Proxy section also keeps track of the URLs that you have visited. BurpSuite is basically proxy that sits between your browser and server. When you setup proxy like BurpSuite, the request that you send out from web browser gets intercepted by proxy, the request that you send out from your web browser gets intercepted by the proxy , then you decide what to do with the request whether to forward the request to server to just to drop it and delete it. The proxy sections basically intercept the URLs and then you can now forward the URLS and requests to appropriate tools.
10. You can use burps embedded browser if you click on Open browser
, then it should open the embedded browser. The embedded browser is specifically configured to work with BurpSuite and it basically comes on along with the installation of BurpSuite. You can also configure external browser to work with BurpSuite. In the defaults the proxy is configured to listen to incoming traffic at local host port number 8080.
11. Example, make sure to turn the intercept on. Back to BurpSuite browser. Request any website as example www.youtube.com. The BurpSuite browser is flashing. If you go to Proxy/Intercept
section you will see that the BurpSuite proxy intercepted the request made from web browser. The BurpSuite browser is hanging because it is waiting the BurpSuite proxy to forward the request it is holding or it has intercepted. We can drop or delete the request or we can forward the request. When we select forward, the web page is loaded to the browser.