Web Penetration Testing Using Nessus and Metasploit Tool - T01634126129
Web Penetration Testing Using Nessus and Metasploit Tool - T01634126129
net/publication/271294317
CITATIONS READS
6 3,691
3 authors, including:
Indraneel Mukhopadhyay
Institute of Engineering & Management
32 PUBLICATIONS 148 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Indraneel Mukhopadhyay on 02 March 2016.
Abstract: Web Penetration Testing is a tool that is being used widely to see how the website reacts when an
vulnerability attack is done. Now days many ethical hackers use web penetration tool to predict the
vulnerabilities of the website. We have done a survey of some of the web penetration tools that are available and
then we have proposed a architecture using nesus and metasploit tool to do scan vulnerabilities of an website.
General Terms: Web Penetration Tool, Vulnerability Scanner, Security
Keywords: Web Penetration Tool, Vulnerability Scanner, Nessus, Metasploit, Kali Linux, ethical hacking
I. Introduction:
Penetration Testing is a great way to identify vulnerabilities that exists in a system or network that has
an existing security measures in place. A penetration test, or the short form pen test, is an attack on a computer
system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and
data..A penetration test involves identifying the target systems and the goal, then reviewing the information
available and undertaking available means to attain the goal. A penetration test will advise if a system is
vulnerable to attack, if the defenses were sufficient and which defenses (if any) were defeated in the penetration
test. Effective penetration tests will couple this information with an accurate assessment of the potential impacts
to the organization and outline a range of technical and procedural countermeasures to reduce risks [1].The
results of these tests or attacks are then documented and presented as report to the owner of the system and the
vulnerabilities identified can then be resolved after the vulnerability scan of a host.
Penetration testing using commercially available automated tool scan help avoid such faults, but
analysis of several popular testing tools reveals significant drawbacks in their performance. We surveyed on
different types vulnerabilities by simulating attacks from malicious users on a target application. Identifying the
input vectors of a web application and checking the results of an attack are important parts of penetration
testing, which is called web penetration testing as they indicates where an attack could be introduced and
whether an attempted attack was successful or not. Vulnerability assessments are necessary for discovering
potential vulnerabilities throughout the environment. Full exploitation of systems and services is not generally in
scope for a normal vulnerability assessment engagement. Systems are typically enumerated and evaluated for
vulnerabilities, and testing can often be done with or without authentication. Most vulnerability management
and scanning solutions provide actionable reports that detail mitigation strategies such as applying missing
patches, or correcting insecure system configurations.
This paper has been divided into following sections. Section 2 deals with previous work that has
happened, section 3 deals with the proposed architecture, next section deals with examples of different Web
Penetration Testing tools. Section 5 deals with implementation details and we conclude the paper with future
scope.
4.1 Skipfish: Skipfish is an active web application security reconnaissance tool. It prepares an interactive
sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is
then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final
report generated by the tool is meant to serve as a foundation for professional web application security
assessments.
4.2 Wapiti: Wapiti allows you to audit the security of your web applications .It perform "black-box" scans, i.e.
it does not study the source code of the application but it will scan the web pages of the deployed web app,
looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting
payloads to see if a script is vulnerable.
4.3 Arachni: Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping
penetration testers and administrators evaluate the security of web applications. Arachni is smart, it trains itself
by learning from the HTTP responses it receives during the audit process. Unlike other scanners, Arachni takes
into account the dynamic nature of web applications and can detect changes caused while travelling through the
paths of a web application's cyclomatic complexity. This way attack/input vectors that would otherwise be
undetectable by non-humans are seamlessly handled by Arachni. Finally, Arachni yields great performance due
to its asynchronous HTTP model (courtesy of Typhoeus). Thus, you'll only be limited by the responsiveness of
the server under audit and your available bandwidth.
4.4 Nessus:. Nessus is a network security scanner. It utilizes plug-ins, which are separate files, to handle the
vulnerability checks. This makes it easy to install plug-ins and to see which plug-ins are installed to make sure
that your are current. Nessus uses a server-client architecture. The main server will need to be built on a
supported Unix-like operating system. The client is available for Unix, Linux, and Windows. The server is not
an option because “it performs the security checks.[6]
One of the most attractive features of Nessus is open source and many people contribute to Nessus
everyday and that helps to keep it up-to-date. There will be plug-ins for new vulnerabilities within days of the
vulnerabilities being released to the public. Another feature is that Nessus scans for vulnerabilities on Windows
www.iosrjournals.org 127 | Page
Web Penetration Testing using Nessus and Metasploit Tool
and Unix systems. This helps make it a good all-around tool so that you can scan a mixed environment in one
session. Next, Nessus utilizes Nmap for port scanning. Nmap has become a standard in the Security Industry for
good reasons. Nmap is known as an extremely fast port scanner.
4.5 w3af: w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework
to find and exploit web application vulnerabilities that is easy to use and extend. To read our short and long term
objectives, please click over the Project Objectives item in the main menu. This project is currently hosted at
SourceForge, for further information, you may also want to visit w3af SourceForge project page..
4.6 Acunetix: Acunetix web vulnerability scanner is a tool designed to discover security holes in your web
applications that an attacker would likely abuse to gain illicit access to your systems and data. It looks for
multiple vulnerabilities including SQL injection, cross site scripting, and weak passwords. The application can
be used to perform scanning for web and application vulnerabilities and to perform penetration testing against
the identified issues. Mitigation suggestions are then provided for each weakness and can be used to increase the
security of the web server or application being tested.
4.7 Websecurify: Web security is a powerful web application security testing platform designed from the
ground up to provide the best combination of automatic and manual vulnerability testing technologies. It is
available for all major desktop platforms including mobile devices and web.
Table 1 compares different Web Penetration Tools that are available with respect to different properties.
V. Implementation Details:
To implement our proposed architecture our initial analysis we started using Nessus tool for
vulnerability scanning. After the vulnerability analysis using Nessus we get the the vulnerability list then we
attack the site using Metasploit tool. The Metasploit Framework is a tool that collectively combines exploits into
one central location ideally for security researchers. Using Metasploit tool we can ethically hack a site. Equally
important is the ability to correlate information provided by different types of requests Furthermore ,tools
should be based on standardized and consistent procedures, implementing a well defined set of testing
components to provide integrated support for detecting a maximum number of vulnerabilities and a minimal
number of false positives. A generic penetration testing tool for Web services that combines all these attributes
is a goal for the future. In our work we found vulnerability of a given website and attack to determine the
vulnerability of the website.
References
[1]. Joseph Muniz Aamir Lakhani. “Web Penetration Testing with Kali Linux”, PACKT publishing. September 2013.
[2]. Andrey Petukhov, Dmitry Kozlov “Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with
Penetration Testing”, https://www.owasp.org/images/3/ 3e/OWASP-AppSecEU08-Petukhov.pdf
[3]. William G. J. Halfond1,Shauvik Roy Choudhary and Alessandro Orso “Improving penetration testing through static and dynamic
Analysis”. http://www-bcf.usc.edu/~halfond/ papers/halfond11stvr.pdf
[4]. Nuno Antunes and Marco Vieira, “Penetration Testing For Web Services”, http://ieeexplore.ieee.org/stamp/stamp
.jsp?tp=&arnumber=6681866
[5]. William G.J. Halfond, Shauvik Roy Choudhary, and Alessandro Orso ”Penetration Testing with Improved Input Vector
identification”, http://www.cs.columbia.edu/~junfeng /reliable-software/papers/pen-test.pdf
[6]. Paul Schmelzel Nessus: “Vulnerability Scanning and Beyond" https://cyber-defense.sans.org/resources/papers/gsec/ nessus-
vulerability -scanning-103152
[7]. Carlos Joshua Marquez.”An Analysis of the IDS Penetration Tool: Metasploit”, http://www.infosecwriters
.com/text_resources/pdf/jmarquez_ Metasploit.pdf