Tasks

Footprint the Web Infrastructure

Perform Web Application Reconnaissance using Nmap and Telnet

Perform a port and service discovery scan using Nmap on the website www.moviescope.com. Enter the IP address of the machine hosting www.moviescope.com.

10.10.1.19

nmap -T4 -A -v <Target Web Application>

Perform a scan using Nmap on the website www.moviescope.com. Enter the name of the DNS server hosting the domain name for www.moviescope.com.

Server2019

Perform banner grabbing using Telnet on the website www.moviescope.com to identify the make, model, and version of the target web-server software. Identify the server-side application used to develop the web pages.

ASP.NET

telnet www.moviescope.com 80

GET / HTTP/1.0

Perform Web Application Reconnaissance using WhatWeb

Use the WhatWeb tool to perform website footprinting on the website www.moviescope.com. Enter the Meta-Author name.

EC-Council

Use the WhatWeb tool to perform website footprinting on the website www.moviescope.com. Enter the version number of the ASP.NET server-side application used to develop the web pages.

4.0.30319

Perform Web Spidering using OWASP ZAP

Perform web spidering on the www.moviescope.com website using OWASP ZAP. Enter the name of the tab on the OWASP ZAP application that allows you to view detailed information regarding the URLs obtained while performing web spidering.

Spider

Detect Load Balancers

Use the dig command to detect the load balancers on the website www.yahoo.com. Enter YES if load balancers are used or NO otherwise.

YES

Use the lbd tool to detect the load balancers on the website www.yahoo.com. Identify the type of load balancing detected on the website (DNS load balancing or HTTP load balancing).

DNS load balancing

Identify Web Server Directories

Use the Gobuster tool to identify web-server directories on the website www.moviescope.com. Find the number of web-server directories exposed to the Internet.

7

Use Nmap, Gobuster and Dirsearch tools to identify web server directories on the target website. Enter the option that is used to specify the extension of the file while performing directory bruteforcing on a specific file extension using dirsearch in this task.

Use Nmap, Gobuster and Dirsearch tools to identify web server directories on the target website. Enter the option that is used to specify exclude status code while performing directory bruteforcing on a specific file extension using dirsearch in this task.

-x

Perform Web Application Vulnerability Scanning using Vega

Discover vulnerabilities in the target web application (http://10.10.1.22:8080/dvwa) hosted on Windows Server 2022 using Vega. Enter the port number on which DVWA is hosted .

8080

Identify Clickjacking Vulnerability

Use ClickjackPoc to identify any clickjacking vulnerability in the website www.moviescope.com hosted by the Windows Server 2019 machine. Enter YES if the website is vulnerable to clickjacking or NO otherwise.

YES

Identify a clickjacking vulnerability using ClickjackPoc on http://www.moviescope.com. Enter the option that is used to specify the file which contains domain names for scanning.

-f

Perform Web Application Attacks

Perform Brute-force Attack using Burp Suite

Perform a brute-force attack on the WordPress website (http://10.10.1.22:8080/CEH) using Burp Suite. Enter the username/password obtained. Note: username and password files are available at /home/attacker/Desktop/CEHv12 Module 14 Hacking Web Applications/Wordlist.

admin/qwerty@123

Use Intruder and Cluster Bomb in the Burp Suite to brute force the credentials.

Perform Parameter Temparing using Burp Suite

Use Burp Suite to perform parameter tampering on the website www.moviescope.com. Enter the first name of the user associated with the user account ID=2.

john

Use Burp Suite to perform parameter tampering on the website www.moviescope.com. Enter the date of birth of the user associated with the user account ID=4.

20-05-1983

Identify XSS Vulnerability using PwnXSS

Use the PwnXSS tool to scan the target website for cross-site scripting (XSS) vulnerability. Enter the target url that was used in this task for the scan.

Use the PwnXSS tool to scan the target website for cross-site scripting (XSS) vulnerability. Enter the option that is used to specify the target url while performing the scan.

-u

Exploit Parameter Tampering and XSS Vulnerabilities in Web Applications

Perform parameter tampering on the target web application (www.moviescope.com). Enter the first name of the user associated with the user account ID=4.

steve

Perform parameter tampering on the target web application (www.moviescope.com). Enter the profile ID of kety.

3

Perform CSRF Attack

Use the WPScan tool to perform a cross-site request forgery (CSRF) attack on a WordPress website (http://10.10.1.22:8080/CEH). Enter the version of the leenkme plugin installed on the WordPress website. Note: use the credentials admin/qwerty@123 to log in to the WordPress website. You need to exploit the leenkme plugin to perform a CSRF attack.

2.5.0

Enumerate and Hack a Web Application using WPScan and Metasploit

Use the WPScan tool to enumerate usernames on a WordPress website (http://10.10.1.22:8080/CEH). Enter the username obtained.

admin

Use the Metasploit tool to perform a dictionary attack against the web application http://10.10.1.22:8080/CEH and crack the password for the identified username. Enter the cracked password. Note: the password file is available at /home/attacker/Desktop/CEHv12 Module 14 Hacking Web Applications.

qwerty@123

Exploit RCE Vulnerability

Perform command-line execution on a vulnerability found in the DVWA web application (http://10.10.1.22:8080/dvwa/login.php). Enter the hostname of the Windows Server 2022 system. Note: the DVWA login credentials are gordonb/abc123.

Server2022

Command Injection Page (Low Mode)

Perform command-line execution on a vulnerability found in the DVWA web application (http://10.10.1.22:8080/dvwa/login.php). Enter the number of directories found in the C drive of the Windows Server 2022 system.

8

Exploit File Upload Vulnerability

Exploit a file upload vulnerability at low security levels of DVWA (http://10.10.1.22:8080/dvwa/login.php) using Metasploit. Enter the name of the Windows Server 2022 machine.

SERVER2022

Create PHP Payload

Upload the php file in DVWA File Upload section

Create a Listener

In the Firefox visit the dvwa url:

http://10.10.1.22:8080/dvwa/hackable/uploads/upload.php

Exploit Log4j Vulnerability

Gain backdoor access by exploiting Log4j vulnerability on an application installed in Ubuntu machine. What is the port number on which the netcat listener was setup in Parrot Security machine in this task?

9001

Extract and Setup Jdk

Update the JDK Path in the Poc.py file

Change Line no: 62, replace jdk1.8.0_20/bin/javac with "/usr/bin/jdk1.8.0_202/bin/javac"

Change Line no: 87, replace jdk1.8.0_20/bin/java with "/usr/bin/jdk1.8.0_202/bin/java" Change Line no: 99, replace jdk1.8.0_20/bin/java with "/usr/bin/jdk1.8.0_202/bin/java"

Create a Netcat Listener

Create a Payload

Copy the send me payload and paste in the username field and enter any random password and press Login

In the Netcat window

Detect Web Application Vulnerabilities

N-Stalker Web Application Security Scanner

Detect web application vulnerabilities using N-Stalker Web Application Security Scanner. Flag submission is not required for this task, enter "No flag" as the answer.

No flag

Last updated

Was this helpful?