Chat with us, powered by LiveChat Lab8.docx - STUDENT SOLUTION USA

Section-2: Exploit Local File Upload Vulnerability

A local file upload vulnerability allows a user to upload a dangerous file to the webserver with the help of a vulnerable web application. The malicious file can then be executed on the webserver to perform malicious actions.

1)

4) Log in to web application by typing user as Username and user as Password.

5)

You will a simple help page showing how to use a PHP backdoor.

cat command is a simple tool on Linux distributions that prints the content of the files to the screen

cat /etc/passwd shows the content of the passwd file, which stores critical user information in Unix/Linux operating systems.

simple-backdoor.php enables website users to run shell commands by using the address bar of the browser. As the user, you provide the command as a parameter to the PHP file, and the PHP file takes the command, runs it at the webserver where the PHP file has been stored, and then prints the output to the browser screen instead of a terminal screen.

9)

Take a screenshot of the browser window.

Section-3: Exploit Local File Inclusion Vulnerability

Local File Inclusion (LFI) vulnerability causes web applications to expose or run files on the webserver. A web application is nothing but shows and executes the files stored on the webserver. However, a poorly written web application may cause a malicious user to request the other files stored on the webserver; those files may store sensitive information or even be executables.

1) Log in to Kali Linux on the Netlab environment.

2) Open Firefox by clicking the Kali icon on the bottom left corner, typing Firefox, and clicking on the Firefox ESR icon

3) Visit this page

4)

4) Log in to web application by typing user as Username and user as Password

5)

) is a powerful utility to perform automatic SQL injections. It comes in Kali Linux distribution. Most pen testers use SQL map to try many different SQL injections on a given web form.

Reference for SQL Injection::

Weekly Learning and Reflection 

In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you're confused about. Questions asked here will be summarized and answered anonymously in the next class.

image4.png

image5.emf

image6.emf

image60.emf

image7.emf

image7.png

image8.png

image9.png

image10.png

image11.png

image12.png

image13.png

image14.png

image15.png

image1.png

image2.png

image3.png

error: Content is protected !!