knowledge-base

2017 security workshop

tools

websites

Asynchron: extern loggen

XML vulnerability

read server file via XML entities at XML file uploads

burp

headless

java -Xmx3000m -Djava.awt.headless=true -jar "/Applications/Burp Suite Professional.app/Contents/java/app/burpsuite_pro.jar" --config-file=burp-project-options.json

infiltrator & scanner

Burp Infiltrator is a tool for instrumenting target web applications in order to facilitate testing using Burp Scanner. Burp Infiltrator modifies the target application so that Burp can detect cases where its input is passed to potentially unsafe APIs on the server side.

java -jar burp_infiltrator_java.jar

collaborator

Burp Collaborator is an external service that Burp can use to help discover many kinds of vulnerabilities.

arachni

./arachni --browser-cluster-pool-size 2 --audit-links --audit-forms --audit-xmls --audit-jsons --scope-exclude-pattern="logout|\.js|\.css|updatePassword" --plugin=login_script:script=login-marathon.js --session-check-pattern='Logout' --checks=*,-backup_files,-backup_directories,-common-files-common_directories http://kali:8080/marathon/secured/profile.page --session-check-url='http://kali:8080/marathon/showMarathons.page'

document.getElementsByName('j_username')[0].value = "john";
document.getElementsByName('j_password')[0].value = "john";
document.forms[0].submit();

./arachni_reporter 'kali 2017-07-07 08_03_43 -0400.afr'

./arachni_web

find-security-bugs

find-security-bugs find-bugs plugins

owasp ASVS

https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project

break out characters

&&
|
'
"
%00
?

etc

traning material

Slides & Speeches Christian:

setup instructions