Module 2: Tools (archived)

This topic has either been replaced or deprecated and is not required for any exams or assessments. The content remains available for those seeking additional research and learning opportunities.

Getting Started

Accessing The Lab Machines

Updated your /etc/hosts file for the labs. IPs change, make sure they're updated when they do.

About Proxies

The "middleman".

Burp Suite

Burp Suite's Built-In Browser

Proxy > Open Browser.

Using Burp Suite with Other Browsers

Proxy settings: 127.0.0.1 port 8080;

Proxy

Proxy manages interception of web traffic.

Intercept:

  • Forward: pass the web request along.

  • Drop: discard this request.

HTTP History:

  • Sort all pages visited and traffic forwarded in sequential order.

Options:

  • Add/Edit/Delete proxy settings.

  • Match & Replace to modify requests/responses .

Intruder

Used for modifying request/responses to attack the target with payloads. ex. brute forcing a login page.

Repeater

Replays requests/responses, allowing us to modify them for testing purposes.

Inspector is available inside the Repeater tab, allowing decoding as well as viewing various attributes and headers with ease.

Extra Mile

This is just the lab.

Nmap

Nmap Scripts

List of scripts can be found at /usr/share/nmap/scripts/.

Use the -sC or --script option for running scripts with the Nmap scripting engine (NSE).

Extra Mile

Doing the lab.

Wordlists

SecLists Installation

Just apt install seclists.

Choosing a Wordlist

SecLists are split up into categories, make yourself familiar with them.

Building Custom Wordlists

Cewl can be used to crawl a webpage, generating a wordlist. The -d switch can be used to set the depth of the crawl. The -m switch sets the minimum word length.

Example usage of cewl

Gobuster

Installing Gobuster & Basic Usage

Just apt install gobuster.

Endpoint Discovery with Gobuster

Example usage of gobuster

Go Bust Those Subdomains!

Subdomain busting example

Wfuzz

File Discovery

Fuzzing files with wfuzz

Leaving out the trailing forward slash ensures we're searching for files, not directories.

In some cases, a configuration item known as mod_rewrite is not enabled, and as a result, our trailing forward slash method might not work.

Directory Discovery

Directory discovery with wfuzz

Parameter Discovery

Discovering hidden parameters

Fuzzing Parameter Values

Identifying the erroneous response size

Clean output with no erroneus responses and a successful result

In the examples we've explored, it's important to note that we have only provided the FUZZ keyword. If we were interested in fuzzing multiple parameters, we could include that parameter in our endpoint and supply the FUZ2Z keyword where we wish to fuzz a second value.

Fuzzing POST Data

Sample POST Data Captured with Burp Suite

Fuzzing POST Data & Brute Forcing a Login Page

Suppressing the results with char size 7201

With POST data, it might be useful to perform fuzzing attempts with an authenticated session ID so we can observe results from an authenticated session's perspective.

To retrieve the cookies associated with an authenticated WordPress session we can intercept an authenticated request in Burp Suite, copy all the cookie values, and paste them into our Wfuzz command with the -b parameter.

Extra Mile

Doing a lab.

Hakrawler

Hakrawler Installation

Just sudo apt install hakrawler.

Hakrawler and the Wayback Machine

Sample Output of Hakrawler on the megacorpone.com domain

Shells

Web Technology

The shell we hope to spawn relies on the correct web technology used.

Choosing the Correct Shell

Use the correct shell for the correct system.

Payloads

Example Python Reverse Shell Payload

Example PHP Reverse Shell Payloads

Extra Mile

Do the lab.

Last updated