Powered by Blogger.
Home » » OWASP Top 10 Web Hacking Final Lab 4 - Brute Force Using Burp Suite and crack_web_form.pl

OWASP Top 10 Web Hacking Final Lab 4 - Brute Force Using Burp Suite and crack_web_form.pl

Written By Akademy on Thursday, November 21, 2013 | 8:44 PM


Start Web Browser Session to Mutillidae
  1. On BackTrack, Open Firefox
    • Instructions:
      1. Click on the Firefox Icon
    • Notes (FYI):
      • If FireFox Icon does not exist in the Menu Bar Tray, then go to Applications --> Internet --> Firefox Web Browser
  2. Open Mutillidae
    • Notes (FYI):
      • Replace 192.168.1.111 in the following URL --> http://192.168.1.111/mutillidae, with your Mutillidae's IP Address obtained from (Section 3, Step 3)
    • Instructions:
      1. http://192.168.1.111/mutillidae

Section 8. Blog Reconnaissance
  1. Select View Someones Blog
    • Instructions:
      1. OWASP Top 10 --> A1 - SQL Injection --> SQLMAP Practice --> View Someones Blog
  2. Possible Usernames
    • Instructions:
      1. Click on Please Choose Author
    • Note(FYI):
      • Without even logging in, you are able to view logs of other users.
      • This is normally not a big deal.
      • However, the below list box will contain the value or the database username of each displayed username.
  3. View Source Code  for View Someones Blog
    • Instructions:
      1. Right Click on white background
      2. Click on View Page Source
  4. Search Source Code for Username
    • Instructions:
      1. Press the <Ctrl> and <f> keys to search the source code
      2. Type "admin" and press enter
        • Include the quotes
    • Note(FYI):
      • Notice for every username in this line, there will be a tag called <option value="USERNAME">.
      • <option value="admin">admin</option>
        • <option value="admin" - This is the database value
        • >admin</option> - This is the display name of the user
  5. Parse Source Code for Username
    • Note(FYI):
      • Replace 192.168.1.111 with the Fedora(Mutillidae) IP Address obtained from (Section 3, Step 3).
      • Below is just a small tutorial on using a little bit of elbow grease (curl, grep, sed and awk) to do a lot of parsing.
    • Instructions:
      1. curl -L "http://192.168.1.111/mutillidae/index.php?page=view-someones-blog.php" 2>/dev/null | grep -i \"admin\" | sed 's/"//g' | awk 'BEGIN{FS=">"}{for (i=1; i<=NF; i++) print $i}' | grep -v value | sed s'/<\/option//g'
        • curl -L "Webpage", retrieves the source code of a webpage.
        • 2>/dev/null, means do not view errors or curl status output.
        • grep -i \"admin\", display curl output that contains the string "\"admin\"".
        • sed 's/"//g', use sed to replace quotes with nothing
        • awk 'BEGIN{FS=">"}{for (i=1; i<=NF; i++) print $i}', use the ">" character as a delimiter or field separator and print each array element on a separate line
        • grep -v value, display array element output that only contains the string "value".
        • sed s'/<\/option//g', use sed to replace the string "</option" with nothing.
Section 9. Viewing Login.php Error Message
  1. Test Login.php
    • Instructions:
      1. Click Login/Register
      2. Name: admin
      3. Password: admin
      4. Click the Login Button
  2. Copy the Login.php Error Message
    • Instructions:
      1. Highlight "Authentication Error", and Right Click
      2. Select Copy
  3. Open gedit
    • Instructions:
      1. gedit &
      2. Press Enter
  4. Paste Message
    • Instructions:
      1. Press the <Ctrl> and <v> keys to paste message

Section 10. Viewing Login.php Source Code
  1. View Login.php Source
    • Instructions:
      1. Click on Login/Register
      2. Right Click on the white screen background, select View Page Source.
  2. Analyze Login.php Source
    • Instructions:
      1. Press the <Ctrl> and <f> keys at the same time
      2. Type form action in the find box and press enter.
    • Notes (FYI):
      • Notice the naming convention of the username and password textboxes.
      • Notice the naming convention and value of the submit button.

Section 11. Configure Firefox Proxy Settings
  1. View Preferences
    • Instructions:
      1. Click on Firefox
      2. Select Preferences --> Preferences
  2. Advanced Settings...
    • Instructions:
      1. Click on the Advanced Icon
      2. Click on the Network Tab
      3. Click on the Setting... button
  3. Connection Settings
    • Instructions:
      1. Click on Manual proxy configurations
      2. Type "127.0.0.1" in the HTTP Proxy Text Box
      3. Type "8080" in the Port Text Box
      4. Check Use the proxy server for all protocols
      5. Click OK
      6. Click Close

Section 12. Configure Burp Suite
  1. Start Burp Suite
    • Instructions:
      1. Applications --> BackTrack --> Vulnerability Assessment --> Web Application Assessment ---> Web Vulnerability Scanner --> burpsuite
  2. JRE Message
    • Instructions:
      1. Click OK
     
  3. Configure proxy
    • Instructions:
      1. Click on the proxy tab
      2. Click on the options tab
      3. Verify the port is set to 8080
  4. Turn on intercept
    • Instructions:
      1. Click on the proxy tab
      2. Click on the intercept tab
      3. Verify the intercept button shows "intercept is on"
     
  5. Try Logging in
    • Note(FYI):
      • You should already be on the Login Page.
      • Replace 192.168.1.111 with the Fedora(Mutillidae) IP Address obtained from (Section 3, Step 3).
    • Instructions:
      1. The following URI should already be in the address box
        • http://192.168.1.111/mutillidae/index.php?page=login.php.
      2. Name: admin
      3. Password: admin
      4. Click the Login Button
        • Note: The Webpage will not refresh, because it is waiting on Burp Suite.
      5. Continue to Next Step
  6. Verifying Burp Suite Results
    • Instructions:
      • Highlight username=admin&password=admin&login-php-submit-button=Login and right click
      • Click Copy
    • Note(FYI):
      1. On the first line, you can see POST has occurred for login.php
      2. username=admin, username is the name of the textbox and admin is its' value.
      3. password=admin, password is the name of the textbox and admin is its' value.
      4. login-php-submit-button=Login, login-php-submit-button is the name of the button and Login is its' value.
  7. Paste Message
    • Instructions:
      1. Press the <Ctrl> and <v> keys to paste message
    • Note(FYI):
      • After this step, you should see following two messages:
        1. Authentication Error
        2. username=admin&password=admin&login-php-submit-button=Login

Section 13. Crack Web Form
  1. Download and Prepare Crack Web Form
    • Instructions:
      1. mkdir -p /pentest/passwords/cwf
      2. cd /pentest/passwords/cwf
      3. wget http://www.computersecuritystudent.com/SECURITY_TOOLS/MUTILLIDAE/MUTILLIDAE_2511/lesson4/cwf.v2.tar.gz
      4. ls -l cwf.v2.tar.gz
      5. tar zxovf cwf.v2.tar.gz
  2. Crack Web Form Functionality
    • Instructions:
      1. ./crack_web_form.pl -help | more
  3. Using Crack Web Form
    • Note(FYI):
      • Replace 192.168.1.111 with the IP Address obtained (Section 3, Step 3).
    • Instructions:
      1. ./crack_web_form.pl -U admin -http "http://192.168.1.111/mutillidae/index.php?page=login.php" -data "username=USERNAME&password=PASSWORD&login-php-submit-button=Login" -F "Authentication Error"
        • -U, Is an optional parameter.  It allows you to specify a username.  If the username is not supplied, then the username will default to admin.
        • -P, Is an optional parameter.  It allows you to specify the location of the password file.  The default password file is set to the password.txt file located in the same directory as crack_web_form.pl.
        • -http, Is a required parameter. It allows to specify the login page.  Supply the login page you used in (Section 12, Step 5).
          • http://192.168.1.111/mutillidae/index.php?page=login.php
        • -data, Is a required parameter. It allows you to specify the HTTP POST DATA.
          • username=USERNAME, where USERNAME is either the default "admin" or replaced by the user supplied parameter.
          • password=PASSWORD, where PASSWORD is replaced by values in the password file.
          • "username=USERNAME&password=PASSWORD&login-php-submit-button=Login", this is the string we obtain from Burp Suite in (Section 12, Step 7).
        • -F, Is an optional parameter.  It allows you to specify the authentication failure message.  Supply the failure message you obtained in (Section 9, Step 11).  The default failure message is set to "fail|invalid|error", where the message is case insensitive
          • "Authentication Error", this is the string we obtain from (Section 9, Step 4).
  4. Crack Web Form Results
    • Instructions:
      1. crack_web_form.pl found the password (adminpass) for username (admin).

Section 14. Remove Firefox Manual Proxy Configuration
  1. View Preferences
    • Instructions:
      1. Click on Firefox
      2. Select Preferences --> Preferences
  2. Advanced Settings...
    • Instructions:
      1. Click on the Advanced Icon
      2. Click on the Network Tab
      3. Click on the Setting... button
  3. Connection Settings
    • Instructions:
      1. Click on the No proxy Radio Button
      2. Click on the OK Button
      3. Click on the Close Button

Section 15. Test Admin Password
  1. Test Login.php
    • Instructions:
      1. Click Login/Register
      2. Name: admin
      3. Password: adminpass
        • The password was obtained from (Section 13, Step 4).
      4. Click the Login Button
  2. Verify Login Message
    • Note(FYI):
      1. Notice that message "Logged In Admin: admin (root)".
     
Section 16. Proof of Lab

Share this article :

0 comments:

 
Trung Tâm Đào Tạo An Toàn Thông Tin Học Hacker Mũ Xám Online | Học An Ninh Mạng Trực Tuyến | CEH VIỆT NAM
Copyright © 2013. HACKER MŨ XÁM - All Rights Reserved
Web Master @ Võ Sĩ Máy Tính
Contact @ Đông Dương ICT