{ Using Tamper Data with crack_web_form.pl }
Section 0. Background Information |
- What is Damn Vulnerable Web App (DVWA)?
- Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable.
- Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
- Pre-Requisite Lab
- Lab Notes
- In this lab we will do the following:
- We will enable Tamper Data in BackTrack's Firefox
- We will use Tamper Data to discover DVWA's HTTP POST DATA string.
- We will configure crack_web_form.pl, which was written by computersecuritystudent.com.
- We will use crack_web_form.pl to discover the admin password to DVWA.
- Legal Disclaimer
Tài liệu dùng cho việc nghiên cứu và học tập
Section 1. Configure Fedora14 Virtual Machine Settings |
- Open Your VMware Player
- Instructions:
- On Your Host Computer, Go To
- Start --> All Program --> VMWare --> VMWare Player
- Edit BackTrack Virtual Machine Settings
- Instructions:
- Highlight fedora14
- Click Edit virtual machine settings

- Edit Network Adapter
- Instructions:
- Highlight Network Adapter
- Select Bridged
- Click on the OK Button.

Section 2. Login to Fedora14 |
- Start Fedora14 VM Instance
- Instructions:
- Start Up VMWare Player
- Select Fedora14
- Play virtual machine

- Login to Fedora14
- Instructions:
- Login: student
- Password: <whatever you set it to>.
-

Section 3. Open Console Terminal and Retrieve IP Address |
- Start a Terminal Console
- Instructions:
- Applications --> Terminal

- Switch user to root
- Instructions:
- su - root
- <Whatever you set the root password to>
-

- Get IP Address
- Instructions:
- ifconfig -a
- Notes:
- As indicated below, my IP address is 192.168.1.106.
- Please record your IP address.
Section 4. Temporarily Disable SELINUX and Firewall |
- Start a Terminal Console
- Instructions:
- sestatus
- If SELinux status: is set to disabled OR if Current mode: is set to permissive, then skip the next steps, and Continue to the Next Section.
- If SELinux status: is set to enabled AND if Current mode: is set to enforcing, then Continue the next steps.
- Notes:
- In my case, I need to temporarily put selinux in permissive mode to demonstrate basic attacks on DVWA.
- Place selinux in permissive mode
- Instructions:
- echo 0 > /selinux/enforce
- Placing a "0" in the enforce file, puts selinux in permissive mode.
- sestatus
- Notice that "Current mode:" changed to permissive.
-

- Disable Firewall
- Instructions:
- service iptables save
- This is not really necessary, unless you have made recent changes to the firewall.
- service iptables stop
- This command disables the firewall.
Section 5. Configure BackTrack Virtual Machine Settings |
- Open Your VMware Player
- Instructions:
- On Your Host Computer, Go To
- Start --> All Program --> VMWare --> VMWare Player
- Edit BackTrack Virtual Machine Settings
- Instructions:
- Highlight BackTrack5R1
- Click Edit virtual machine settings

- Edit Network Adapter
- Instructions:
- Highlight Network Adapter
- Select Bridged
- Do not Click on the OK Button.

Section 6. Login to BackTrack |
- Start BackTrack VM Instance
- Instructions:
- Start Up VMWare Player
- Select BackTrack5R1
- Play virtual machine

- Login to BackTrack
- Instructions:
- Login: root
- Password: toor or <whatever you changed it to>.

- Bring up the GNOME
- Instructions:
- Type startx

Section 7. Open Console Terminal and Retrieve IP Address |
- Open a console terminal
- Instructions:
- Click on the console terminal
- Get IP Address
- Instructions:
- ifconfig -a
- Notes:
- As indicated below, my IP address is 192.168.1.105.
- Please record your IP address.
Section 8. Configure Tamper Data |
- Start Firefox
- Instructions:
- Click on Firefox

- Select Add-ons
- Instructions:
- Tools --> Add-ons

- Enable Tamper Data
- Instructions:
- Click on Extensions
- Click on Tamper Data Enable Button

- Restart Firefox
- Instructions:
- Click Restart Now (See Picture)

Section 9. Capturing HTTP-POST-DATA with Tamper Data |
- Start DVWA
- Instructions:
- Start up Firefox on BackTrack
- Place http://192.168.1.106/dvwa/login.php in the address bar.
- Replace 192.168.1.106 with Fedora's IP address obtained in (Section 3, Step 3).

- Engage Tamper Data
- Instructions:
- Tools --> Tamper Data

- Start Tamper Data
- Instructions:
- Click on Start Tamper
- Login to DVWA
- Instructions:
- Login: admin
- Password: password
- Click on Login

- Tamper with request?
- Instructions:
- Uncheck the Continue Tampering checkbox
- Click Submit
- Stop Tamper
- Instructions:
- Click on Stop Tamper

- Copy POSTDATA String
- Instructions:
- Click on the First POST line.
- Right Click on POSTDATA and Select Copy

- Start Up Notepad
- Instructions:
- Applications --> Wine --> Programs --> Accessories --> Notepad
- Paste Post Data in Notepad
- Instructions:
- Edit --> Paste
- Logout of DVWA
- Instructions:
- Click Logout
- Record Failed Message
- Instructions:
- Username: admin
- Password: wrongpassword
- Click Login Button
- Right Click on Login failed, Select Copy.
- Paste in Notepad
- Instructions:
- Edit --> Paste
- Save in Notepad
- Instructions:
- File --> Save
- Filename: dvwa-post-data.txt
- Click Save
Section 10. Configuring and running crack_web_form.pl |
- Make Directory
- Instructions:
- mkdir /pentest/passwords/cwf
-

- Download File
- Instructions:
- Start Up Firefox in BackTrack
- Input the below URL into the address bar
- http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson5/cwf.tar.gz
- Select Save File Radio Button
- Click OK
- Save File
- Instructions:
- Click on File System
- Click on pentest
- Click on passwords
- Click on cwf
- Click Save
- Un-tar Crack Web Form
- Instructions:
- cd /pentest/passwords/cwf
- ls -l
- tar xovfz cwf.tar.gz
- chmod 700 crack_web_form.pl
- Crack Web Form Functionality
- Instructions:
- ./crack_web_form.pl -help
- Using Crack Web Form
- Note(FYI):
- Replace 192.168.1.106 with the IP Address obtained (Section 3, Step 3).
- Instructions:
- ./crack_web_form.pl -U admin -http "http://192.168.1.106/dvwa/login.php" -data "username=USERNAME&password=PASSWORD&Login=Login" -M "Failed Login"
- -U, Is an optional parameter. It allows you to specify a username. If the username is not supplied, then the username will default to admin.
- -P, Is an optional parameter. It allows you to specify the location of the password file. The default password file is set to the password.txt file located in the same directory as crack_web_form.pl.
- -http, Is a required parameter. It allows to specify the login page. Supply the login page you used in (Section 9, Step 1).
- -data, Is a required parameter. It allows you to specify the HTTP POST DATA.
- username=USERNAME, where USERNAME is either the default "admin" or replaced by the user supplied parameter.
- password=PASSWORD, where PASSWORD is replaced by values in the password file.
- -M, Is an optional parameter. It allows you to specify the authentication failure message. Supply the failure message you obtained in (Section 9, Step 11). The default failure message is set to "fail|invalid|error", where the message is case insensitive.

- View Crack Web Form results
- Instructions:
- Notice it took 239 attempt to discover the correct password.
- Proof of Lab
- Instructions:
- cd /pentest/passwords/cwf
- grep Successful crack_output.txt
- date
- echo "Your Name"
- Replace the string "Your Name" with your actual name.
- e.g., echo "John Gray"
- Proof of Lab Instructions:
- Do a <PrtScn>
- Paste into a word document
- Email to AnToanThongTin.Edu.VN@Gmail.Com

0 nhận xét:
Đăng nhận xét