Burpsuite2
OPEN
Burp Suite - Study Guide
Burpsuite
Burp Suite Basics
Burp Suite
Description
A local police department has hired you to pentest their website. They had a new website created by a web development company and they want to make sure that everything is secure and in order.
In this lab you will practice with Burp Suite, configuring the scope of the engagement, intercepting the communications with a webserver and spidering a target web application. You can access the target web application at the following address 10.100.13.5.
Goal
The goal of this lab is to test the given web application in order to find a hidden path that contains a restricted area. Once the hidden path is discovered, your goal will be to bypass the authentication exploiting a "feature" left over by the developers while "debugging" the area.
Tools
The best tools for this lab are:
Web browser
Burp Suite
Steps
Explore the web application
Explore the Web application at the address 10.100.13.5 and verify that everything works as intended. You should see the Police Department website.
Configuring your arsenal
Before starting analyzing the target application, configure your browser and Burp Suite. Do not forget to configure the scope of the engagement in order to analyze only requests and responses that belong to that scope, and filter the site map to show only in-scope items.
At the end of the configurations, perform a test to make sure that everything works as intended.
Mapping the target application
Some resources are hidden and performing an active crawling of the application, by following links, submitting forms, parsing responses, etc. requires time. Find a way to automate all of these operations in one click!
The Keystone
The automated mapping should have revealed a hidden path. Explore the path and extract useful information to reach your goal. You should note that developers are full of "magic tricks", find the one used in this application and you will find the keystone.
Solutions
Please go ahead ONLY if you have COMPLETED the lab or you are stuck! Checking the solutions before actually trying the concepts and techniques you studied in the course, will dramatically reduce the benefits of a hands-on lab!
Solutions steps
Explore the web application
You should see a page like this:
Welcome to Foo Police Department!
Configuring your arsenal
In order to analyze the traffic, spider the targeted web application and discover the hidden path of the restricted area. You need to setup the proxy both in your browser and in Burp Proxy.
In your browser
In Burp Proxy
In addition to the listener, it's a best practice to configure the proxy to intercept request and responses that belongs to the targets in scope:
To configure the scope of engagement browse the tab Target and then Scope. To add a URL to the scope you can paste the link or type it manually.
In the latest version of Burp Suite, you will need to click the "Use advanced scope control" checkbox before you can specify the scope in that form, as shown in the screenshots below:
In the site map, configure the filter by request type adding a tick to "Show only in-scope items". This will show you only the resources that belong to the scope defined previously.
To test if your configurations are working as intended, just refresh the link into the browser and verify that the intercept has captured your request. If not, be sure the Intercept button is toggled.
Once forwarded all the requests and responses, you should see the list of the resources exchanged in the Target > Site map tab:
Mapping the target application
In order to automatically map the target web application we can use the Burp Spider tool. To do this, just right click on the target host in the site map list. Then select "Spider this host":
Note that latest Burp versions do not include the Spider functionality. That being said you can still download an older Burp version that has it (such as Community 1.7.36) by navigating to https://portswigger.net/burp/releases
In the Spider tab you'll see the status of this operation:
After a while, you should see a list of paths on the Site Map that were not listed before. One of them is the hidden area we are looking for:
The Keystone
Visiting the hidden path, you should notice that the application exposes an authentication page. It requires a login and you don't have one.
The next step needs to analyze this page in order to find something useful to bypass the authentication.
Analyzing the server response to the login.php resource, you should have noticed that at the end of the file there is a debugging message. The developers implemented a simple login bypass to avoid the authentication during the debugging operations and forgot to remove the message in production.
Requesting the login path with the parameters suggested by the developers:
You will access the restricted area and reach the goal of this lab! You also notify your client of your findings and successfully close your engagement.
STATUS
Lab Not Running
LAB NOT RUNNING
Start the lab and you’ll be able to download a VPN File and connect.
Penetration Testing Introduction - Study Guide
Comments
Post a Comment