Hacking Test
Hacking Test
KALI LINUX
KALI LINUX - INTRODUCTION
• Kali Linux is a Debian-derived Linux distribution designed for
digital forensics and penetration testing
• has over 600 preinstalled penetration-testing programs
• Requirements:
• requires a minimum of 20GB hard disk space for installation
• a minimum of 1GB RAM for i386 and AMD64 architectures
KALI LINUX – INSTALLATION DEMO
INTRODUCTION
WEBGOAT
WebGoat - Introduction
WEBGOAT
WebGoat - Explanation
WebGoat - Explanation
HTTP Basics Buffer Overflow (TBD)
HTTP Splitting and Cache Poisoning HTTPOnly Test
How to Exploit Thread Safety Problems How to Perform Command Injection
How to Discover Clues in the HTML How to Perform Parameter Injection
How to Exploit Hidden Fields How to Perform Blind SQL Injection
How to Exploit Unchecked Email How to Perform Numeric SQL Injection
How to Bypass Client Side JavaScript Validation How to Perform String SQL Injection
How to Force Browser Web Resources How to Perform Log Spoofing
How to Bypass a Role Based Access Control Scheme How to Perform XPATH Injection Attacks
How to Bypass a Path Based Access Control Scheme LAB: SQL Injection
LAB: Role based Access Control How to Bypass a Fail Open Authentication
Using an Access Control Matrix Scheme
How to Exploit the Forgot Password Page How to Perform Basic Encoding
How to Spoof an Authentication Cookie Denial of Service from Multiple Logins
How to Hijack a Session How to Create a SOAP Request
Basic Authentication How to Perform WSDL Scanning
LAB: Cross Site Scripting How to Perform Web Service SAX Injection
How to Perform Stored Cross Site Scripting (XSS) How to Perform Web Service SQL Injection
How to Perform Reflected Cross Site Scripting (XSS) How to Perform DOM Injection Attack
How to Perform Cross Site Trace Attacks (XSS) How to Perform XML Injection Attacks
How to Perform JSON Injection Attack
INTRODUCTION
HACKTHISSITE.ORG
HACKTHISSITE.ORG- Explanation
Hackthissite.org
TESTFIRE.NET
TESTFIRE.NET- Explanation
TESTFIRE.NET- Explanation
• Mock banking website
• I have NOT used this site before nor was I able to find much documentation on it
• Exploits you can expect here:
• XSS
• Brute Force
• SQL Injection
• Session Hijacking
• Application Authentication
CONCLUSION
Conclusion
• Set up your own lab environment
• Turn off any services you turn on in your lab
• Segregate your network from the outside world
• Take your time trying to exploit
• Research what you don’t understand
• Think about remediation
• Do not hack external websites (without a contract)
• Work your way up
IS Training Camp
https://www.facebook.com/groups/180281662729813/
4/4