Module 2: Tools (archived)
This topic has either been replaced or deprecated and is not required for any exams or assessments. The content remains available for those seeking additional research and learning opportunities.
Getting Started
Accessing The Lab Machines
Updated your /etc/hosts file for the labs. IPs change, make sure they're updated when they do.
About Proxies
The "middleman".
Burp Suite
Burp Suite's Built-In Browser
Proxy > Open Browser.
Using Burp Suite with Other Browsers
Proxy settings: 127.0.0.1 port 8080;
Proxy
Proxy manages interception of web traffic.
Intercept:
Forward: pass the web request along.
Drop: discard this request.
HTTP History:
Sort all pages visited and traffic forwarded in sequential order.
Options:
Add/Edit/Delete proxy settings.
Match & Replace to modify requests/responses .
Intruder
Used for modifying request/responses to attack the target with payloads. ex. brute forcing a login page.
These requests are throttled in the Community edition.
Repeater
Replays requests/responses, allowing us to modify them for testing purposes.
Inspector is available inside the Repeater tab, allowing decoding as well as viewing various attributes and headers with ease.
Extra Mile
This is just the lab.
Nmap
Nmap Scripts
List of scripts can be found at /usr/share/nmap/scripts/.
Use the -sC or --script option for running scripts with the Nmap scripting engine (NSE).
Extra Mile
Doing the lab.
Wordlists
SecLists Installation
Just apt install seclists.
Choosing a Wordlist
SecLists are split up into categories, make yourself familiar with them.
Building Custom Wordlists
Cewl can be used to crawl a webpage, generating a wordlist. The -d switch can be used to set the depth of the crawl. The -m switch sets the minimum word length.
Example usage of cewl
Gobuster
Installing Gobuster & Basic Usage
Just apt install gobuster.
Endpoint Discovery with Gobuster
Example usage of gobuster
Go Bust Those Subdomains!
Subdomain busting example
Wfuzz
File Discovery
Fuzzing files with wfuzz
Directory Discovery
Directory discovery with wfuzz
Parameter Discovery
Discovering hidden parameters
Fuzzing Parameter Values
Identifying the erroneous response size
Clean output with no erroneus responses and a successful result
Fuzzing POST Data

Fuzzing POST Data & Brute Forcing a Login Page
Suppressing the results with char size 7201
Extra Mile
Doing a lab.
Hakrawler
Hakrawler Installation
Just sudo apt install hakrawler.
Hakrawler and the Wayback Machine
Sample Output of Hakrawler on the megacorpone.com domain
Shells
Web Technology
The shell we hope to spawn relies on the correct web technology used.
Choosing the Correct Shell
Use the correct shell for the correct system.
Payloads
Example Python Reverse Shell Payload
Example PHP Reverse Shell Payloads
Extra Mile
Do the lab.
Last updated