Free Online and Offline Labs From Pentester

Here are some notes while working on those free labs from Pentester.

Free Offline Web Lab for Pentester

https://pentesterlab.com/exercises/web-for-pentester

Download ISO File 

Load into VM

Access the Portal based on the IP you got

Click on Examples on each category to start Lab

Here is Example 1 at XSS Category:

Security model of the web

The basis of the security model of the web is really simple: don't trust the client. Most information a server will receive can be spoofed by the client. Better to be safe than sorry; it's better to filter and escape everything than to realize later on that a value you thought was not user-controlled is.

XSS

Example 1:

Using the basic payload (<script>alert("Your Site is Hacked")</script>), you should be able to get an alert box.
  • http://192.168.2.186/xss/example1.php?name=<script>f</script> <input onfocus=f autofocus>
  • http://192.168.2.186/xss/example1.php?name=<script>alert("Your Site is Hacked")</script>
  • http://192.168.2.186/xss/example1.php?name=%3Cscript%3Ef%3C/script%3E%3Cinput%20onfocus=f%20autofocus%3E

Example 2:

Online Free Lab for Pentester

https://pentesterlab.com/my/progress#onlinefree

https://pentesterlab.com/exercises/recon-05

Fuzzing directories

When accessing a new webserver, it often pays off to brute force directories. To do this, you can use many tools like patatorFFUF or WFuzz (amongst many others).

wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/common.txt 

┌──(kali㉿kali)-[~]
└─$ gobuster dir -u http://hackycorp.com -w common.txt                                                                                                                                                                       
===============================================================
Gobuster v3.8
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://hackycorp.com
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                common.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.8
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.well-known/security.txt (Status: 200) [Size: 156]
/admin                (Status: 301) [Size: 178] [--> http://hackycorp.com/admin/]
/images               (Status: 301) [Size: 178] [--> http://hackycorp.com/images/]
/index.html           (Status: 200) [Size: 16011]
/robots.txt           (Status: 200) [Size: 121]
/startpage            (Status: 301) [Size: 178] [--> http://hackycorp.com/startpage/]
Progress: 4750 / 4750 (100.00%)
===============================================================
Finished
===============================================================


https://hackycorp.com/startpage/











Reference

  • https://pentesterlab.com/exercises/web-for-pentester



版权声明:
作者:玉兰
链接:https://www.techfm.club/p/228260.html
来源:TechFM
文章版权归作者所有,未经允许请勿转载。

THE END
分享
二维码
< <上一篇
下一篇>>