Skip to main content

Posts

Web Application Hacking Techniques Part - 2

Understand the web Application Workflow Introduction   In this module, we will be focusing on web applications, including the types of web applications, how they are designed and how different types of web applications work. To successfully hack into a web application, you first need to understand how the web application works.   In the most simplest form, web applications are just the applicationsthat work over the web, and they only require a browser, which can browse web applications once connected to the Internet.   From a web security standpoint, not all web applications are vulnerable to hackers; it depends on what type of web application it is and what type of information is available, both on the front end, as well as the backend of the web application. We will study in more detail as we walk through the module. Types of Web Applications     Generally, there are two types of web applications based on the design of the applications. • Client Side • S...

Web Application Hacking Techniques Part - 1

Why it is important to learn Web Hacking Introduction    Welcome to the web application hacking techniques workshop. In this module, we will discuss why it is important to learn web application hacking techniques and what happens if organizations leave the web applications vulnerable. We will also go across and understand the web application workflows and the different attack vectors for hacking web applications.   This workshop will also demonstrate the actual hacking into web applications and highlights the top vulnerabilities that exist in web applications. Prerequisites    Since this is an advanced topic, it will be required that you already have prior understanding of the following topics and posses some experience in the field of Information Technology. This is not the beginner’s workshop, however, we will try to cover everything from the beginning as much as we can. • Knowledge of TCP/IP protocols • Sound knowledge of HTML & SQL • Basic knowledge on h...

Exploit Development Windows Part - 5

Writing the Exploit for the Discovered Vulnerability   In exploit development, the execution flow of the vulnerable application depends on the return address of the stack pointer, if you cannot get hold of the stack pointer, all your efforts will be useless. Finding Pointers     To find the exact value of where the EIP register is overwritten with the 1000 “A”, or the buffer value of 1000 bytes we have sent, is called “Determining the offset”.    To find the EIP offset, we need to go back to Metasploit to help us. Let’s quickly generate some set patterns with Metasploit and do the same fuzzing but, this time, we will send some set patterns instead of 1000 “A”s and then will again use Metasploit to find the offset for us.       Creating a pattern with Metasploit.        We will now use this pattern and fuzz the server again. Once successfully fuzzed, the EIP value will have four bytes from...

Exploit Development Windows Part - 4

Finding Vulnerability in Application (practice demo) Basic Requirements What you need to cover this module is the prior reading of the previous three modules and a virtual lab setup at your side in order to practice this workshop thoroughly. Exploit Development Lifecycle Analyzing Application       How does it work? In the previous modules, we have been highlighting the fact that you need to first understand the normal behavior of the application. If you know how the application works normally, only then can you detect the abnormal activity. So I believe that you have now installed and configured the lab setup into your machine. Let’s play with the Free Float FTP Server.        In the above figure, FreeFloat FTP Server is running normally on IP Address 172.20.10.14 and the port it is listening on is 21 TCP.    Let’s have a look at the exploit development life cycle we explained in the previous module. ...

Exploit Development Windows Part - 3

Exploit Development Windows Part - 2

Setting up the Lab Environment  Introduction   In order to achieve our objective, we need a test environment where we can keep testing until we reach the end results. To achieve this, let’s first select the vulnerable application and set up our lab for research. Lab Setup • Downloading & Installing Virtual Box • Installing Windows XP as a Virtual Machine • Downloading Vulnerable Application from Exploit-DB • Downloading and Installing Immunity Debugger & Mona.py • Metasploit Framework (pre-installed with Kali) Step 1: Downloading & Installing Virtual Box Download Link: https://www.virtualbox.org/wiki/Downloads.   Select & download the binary, as per your operating system requirement, in my case I will be installing the VirtualBox-4.3.12-93733-OSX from the above download link as shown below. Double click the icon as shown in step 1 in above figure.  Continue to install by clicking the continue button. Begin in...