OWASP Mutilidae
OWASP Mutilidae
Solution:-
So first we need to click on OWASP 2013> A1-Injection (SQL) > SQLi
Extract Data > User Info (SQL) you will get the below the output.
After opening the Url, enter you name & password you will get the below
output.
Enter the query admin' OR 1=1;-- Select * from account; in the name you
Solution:-
Solution :-
Solution :-
Solution:-
So first we need to click on OWASP 2013> A1-Injection (other) > SQLi
Insert- Injection > Register you will get the below the output.
Creating username and password both as abhi05 we get the below output.
Solution:-
So first we need to click on OWASP 2013> A1-Injection (other)> HTML
Injection (HTMLi)> User Info (SQL) you will get the below the output.
After opening the Url, enter you name & password you will get the below
output.
Enter the query admin' OR 1=1;-- Select * from account; in the name you
will get the below result.
Solution:-
So first we need to click on OWASP 2013> A1- Injection (Other) >
Command Injection > DNS Lookup you will get the below the output.
Then we enter the localhost&& cat login.php in the Hostname/IP we get
the below output.
This is also a widespread vulnerability that almost affects 53% of all web
applications.
XSS vulnerability allows a hacker to inject malicious client-side scripts into a
website and then use the web application as an attack vector to hijack user
sessions, or redirecting the victim to malicious websites.
Cross-site scripting attacks can be prevented by:
Using appropriate response headers
Filtering the input and encoding the output
Using the content security policy
Applying a zero-trust approach to user input
Solution:-
So first we need to click on OWASP 2013> A3-Cross Site Scripting
(XSS)> Persistent (Second Order) you will get the below the output
After opening the url we will add the blog for admin Professionals Hack
People <script>alert("Hacked!")</script> we get the below result.
4. A05:2021-Security Misconfiguration:-
Directory Browsing:-
Solution:-
First we need to check if there is any misconfiguration, and if directory
browsing is allowed so right click on documentation tab> Installation
Instructions (Windows)>copy the link.
After copying the link open the Url in another tab remove the mutillidae-
installation-on-xampp-win7.pdf, in the Url you will get the below output.
And as we have entered the index of all the documents and directories,
Hence it shows that Mutillidae is vulnerable to directory browsing.
Solution:-
So to upload the file, first we need to click on OWASP 2013> A5-Security
Misconfiguration> Unrestricted File Upload you will get the below the output.
After opening the upload page, In this interface we will upload a JPEG file
and get the below result.