Penetration testing tools

Assignment Help Computer Network Security
Reference no: EM132973936

Lab: Penetration Testing Tools

Resources folder

Take all the screenshots so that I can follow on my virtual machine later. (All the installation procedures and commands used on Terminal) Seems like you need to install java first (See the resources file)

Exploring WebScarab NG and Webgoat

WebScarab NG is another web security application testing tool that is pre-loaded on our virtual machines.

Olo, WebGoat is a deliberately insecure web application maintained by OWASP. It can be used to teach and practice web application security lessons. Experiment with WebScarab NG and Webgoat by practicing the information provided below. (Click the titles to learn more)

WebScarab Installation
WebScarab-NG (or simply WebScarab) is preinstalled on our Linux-based and XP-based VMS. If this is your first time using WebScarab. please spend some time perusing the WebScarab official vNelp.agg to learn more about the pen-test tool. Before you launch WebScarab on your VM. make sure that no other proxy is running (for example ZAP or Burp must be shut down if it is still running).

In a launched LXTerminal. type the following
-S java -jar /usr/tools/WebScarablWebScarab-ng.0.2.1.one-jar.jar
WebScarab wdl launch. Once the tool is fully loaded, you have WebScarab ready for use as shown in Figure Lab 2.1 Click -0K. No password is needed for user 'se (For advanced user. you can configure your JDBC connection).

Just like ZAP and Burp Suite. WebScarab also functions as a proxy. Therefore. you must change your brows& connection setting before you can use WebScarab to capture the transmitted data between a browser and a web server. If port 8008 (that is also the default port for WebScarab-NG) is used. then you can configure your Firefox the same way as we did for ZAP or Burp. However. port number must be 8008 as shown below (Figure Lab 2 2)

When you access a wobsite from the Firefox browser, WebScarab MI capture the data transmitted between the browser and the websito you are browsing (Figure Lab 2 3) Explore the various tabs and refer to the Vteb$carab NG page to search fix additional resources

To try out the website you can simply dick the shortcut in the Bookmarks Bar to access Webgoat as shovm in Figure Lab 2.6 (You can also manually type the URL

http filocalhost 8080/WebGoaVlogin If a different port was used when you fired up the website in the above LXTerminal you have to change 8080 to the number you specified )

Note You will need to create your login account to use the website Simply create a Username and establish a Password No other information is required To shut down the website. you can simply kill the LXTerminal that holds the website launching process.

Attachment:- Instruction - Lab pen.rar

Reference no: EM132973936

Questions Cloud

How much is left for after all taxes are? paid : The corporate tax rate is 21%?, and your personal tax rate on? (both dividend and? non-dividend) income is 20%. How much is left for after all taxes are? paid
Find the largest positive-going and largest negative-going : Find the largest positive-going and largest negative-going noise spike that can be tolerated - find the transition width and logic swing value
What amount should Lovely report as warranty expense : During 2018 Lovely sold 1,600 units of inventory at a selling price of $125 per unit. What amount should Lovely report as warranty expense
Calculate the net after-tax return on the nonqualified : Discuss the pros and cons of purchasing the nonqualified rather than the bank-qualified municipal described in the previous problem
Penetration testing tools : Penetration Testing Tools - another web security application testing tool that is pre-loaded on our virtual machines
Which capital lease is recorded as an asset on balance sheet : Which capital lease is recorded as an asset on the balance sheet in an amount equal to? the dollar amount of each lease payment multiplied by the total number
What amount is the note payable recorded : What amount is the note payable recorded at on October 1 and how much interest is recognized from October 1 to December 31
What is the avoidable interest for ABC Company : Expenditures were $7,360,000 on March 1, $6,072,000 on June 1, and $9,200,000 on December 31. What is the avoidable interest for ABC Company
What are effective ways to document the consideration : What are effective ways to document the consideration of alternatives/evidence such that the audit documentation demonstrates skeptical thinking

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd