Web App Attack Tools and Techniques
Hello everyone i am continuing form where i left in last part 2. Now will discuss further more tools for penetration testing.
Web Application Audit and Attack Framework
– Discovery to find vulnerabilities
– Exploitation to take control of a target application or its underlying server
w3af Exploits
• w3af includes a number of web app exploits, including:
– xssBeEF is the XSS tool
– sqlmap is an entire SQL injection exploit tool
• Includes an OS shell used through SQLi
– mysqlWebShell provides shell access using SQL injection on MySQL target
– osCommandingShell is a command shell created through command injection flaws
A Combined Pen Test Scenario
Start with Client-Side Exploit of XP Box
Pivot Through XP Box to Exploit Vista Machine
RFMON Wireless Network Enumeration and Discovery
Leveraging Compromised Client Wireless Preferences
Use w3af to Scan Intranet Web Application
Retrieve PII Files from Corporate Web Server
That's it, Done. Now let's have some conclusion from this. That will help you going forward.
Conclusions
– Combining web app, network, and wireless penetration testing isvery powerful
Web Application Audit and Attack Framework
- w3af is a well-known web attack framework
- w3af combines all of the necessary pieces to accomplish an entire web attack
– Discovery to find vulnerabilities
– Exploitation to take control of a target application or its underlying server
- With network access, w3af provides an excellent framework to take our attack to the next level
- Here is the beginning w3af’s information gathering
- We are setting up a scan of a target web application
- We are able to choose our plug-ins and targets
- We can use this interface to scan an application for exploitable vulnerabilities
w3af Exploits
• w3af includes a number of web app exploits, including:
– xssBeEF is the XSS tool
– sqlmap is an entire SQL injection exploit tool
• Includes an OS shell used through SQLi
– mysqlWebShell provides shell access using SQL injection on MySQL target
– osCommandingShell is a command shell created through command injection flaws
A Combined Pen Test Scenario
Start with Client-Side Exploit of XP Box
Pivot Through XP Box to Exploit Vista Machine
RFMON Wireless Network Enumeration and Discovery
Leveraging Compromised Client Wireless Preferences
Use w3af to Scan Intranet Web Application
Retrieve PII Files from Corporate Web Server
That's it, Done. Now let's have some conclusion from this. That will help you going forward.
Conclusions
- Combined attack vectors allow for far deeper penetration into most target networks than separate vectors allow
– Combining web app, network, and wireless penetration testing isvery powerful
- This combination provides a much more accurate view of the business risks posed by vulnerabilities than offered by completely separate network, wireless, and web app tests
- We’ve looked at useful features of Metasploit, Vista wireless power tools, and w3af
- In Part IV of this webcast trilogy, we’ll look at additional attack vectors and tools for further combining these three disciplines and discuss where this type of testing may be headed in the Future.
No comments:
Post a Comment