Free Online and Offline Labs From Pentester
Here are some notes while working on those free labs from Pentester.
Free Offline Web Lab for Pentester
https://pentesterlab.com/exercises/web-for-pentester
Download ISO File
Load into VM
Access the Portal based on the IP you got
Click on Examples on each category to start Lab
Security model of the web
The basis of the security model of the web is really simple: don't trust the client. Most information a server will receive can be spoofed by the client. Better to be safe than sorry; it's better to filter and escape everything than to realize later on that a value you thought was not user-controlled is.
XSS
Example 1:
alert box.- http://192.168.2.186/xss/example1.php?name=<script>f</script> <input onfocus=f autofocus>
- http://192.168.2.186/xss/example1.php?name=<script>alert("Your Site is Hacked")</script>
- http://192.168.2.186/xss/example1.php?name=%3Cscript%3Ef%3C/script%3E%3Cinput%20onfocus=f%20autofocus%3E
Example 2:
Online Free Lab for Pentester
https://pentesterlab.com/my/progress#onlinefree
https://pentesterlab.com/exercises/recon-05
Fuzzing directories
When accessing a new webserver, it often pays off to brute force directories. To do this, you can use many tools like patator, FFUF or WFuzz (amongst many others).
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/common.txt
┌──(kali㉿kali)-[~]
└─$ gobuster dir -u http://hackycorp.com -w common.txt
===============================================================
Gobuster v3.8
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://hackycorp.com
[+] Method: GET
[+] Threads: 10
[+] Wordlist: common.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.8
[+] Timeout: 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.well-known/security.txt (Status: 200) [Size: 156]
/admin (Status: 301) [Size: 178] [--> http://hackycorp.com/admin/]
/images (Status: 301) [Size: 178] [--> http://hackycorp.com/images/]
/index.html (Status: 200) [Size: 16011]
/robots.txt (Status: 200) [Size: 121]
/startpage (Status: 301) [Size: 178] [--> http://hackycorp.com/startpage/]
Progress: 4750 / 4750 (100.00%)
===============================================================
Finished
===============================================================
https://hackycorp.com/startpage/
Reference
- https://pentesterlab.com/exercises/web-for-pentester


共有 0 条评论