Penetration testing tools

Assignment Help Computer Network Security
Reference no: EM132973936

Lab: Penetration Testing Tools

Resources folder

Take all the screenshots so that I can follow on my virtual machine later. (All the installation procedures and commands used on Terminal) Seems like you need to install java first (See the resources file)

Exploring WebScarab NG and Webgoat

WebScarab NG is another web security application testing tool that is pre-loaded on our virtual machines.

Olo, WebGoat is a deliberately insecure web application maintained by OWASP. It can be used to teach and practice web application security lessons. Experiment with WebScarab NG and Webgoat by practicing the information provided below. (Click the titles to learn more)

WebScarab Installation
WebScarab-NG (or simply WebScarab) is preinstalled on our Linux-based and XP-based VMS. If this is your first time using WebScarab. please spend some time perusing the WebScarab official vNelp.agg to learn more about the pen-test tool. Before you launch WebScarab on your VM. make sure that no other proxy is running (for example ZAP or Burp must be shut down if it is still running).

In a launched LXTerminal. type the following
-S java -jar /usr/tools/WebScarablWebScarab-ng.0.2.1.one-jar.jar
WebScarab wdl launch. Once the tool is fully loaded, you have WebScarab ready for use as shown in Figure Lab 2.1 Click -0K. No password is needed for user 'se (For advanced user. you can configure your JDBC connection).

Just like ZAP and Burp Suite. WebScarab also functions as a proxy. Therefore. you must change your brows& connection setting before you can use WebScarab to capture the transmitted data between a browser and a web server. If port 8008 (that is also the default port for WebScarab-NG) is used. then you can configure your Firefox the same way as we did for ZAP or Burp. However. port number must be 8008 as shown below (Figure Lab 2 2)

When you access a wobsite from the Firefox browser, WebScarab MI capture the data transmitted between the browser and the websito you are browsing (Figure Lab 2 3) Explore the various tabs and refer to the Vteb$carab NG page to search fix additional resources

To try out the website you can simply dick the shortcut in the Bookmarks Bar to access Webgoat as shovm in Figure Lab 2.6 (You can also manually type the URL

http filocalhost 8080/WebGoaVlogin If a different port was used when you fired up the website in the above LXTerminal you have to change 8080 to the number you specified )

Note You will need to create your login account to use the website Simply create a Username and establish a Password No other information is required To shut down the website. you can simply kill the LXTerminal that holds the website launching process.

Attachment:- Instruction - Lab pen.rar

Reference no: EM132973936

Questions Cloud

How much is left for after all taxes are? paid : The corporate tax rate is 21%?, and your personal tax rate on? (both dividend and? non-dividend) income is 20%. How much is left for after all taxes are? paid
Find the largest positive-going and largest negative-going : Find the largest positive-going and largest negative-going noise spike that can be tolerated - find the transition width and logic swing value
What amount should Lovely report as warranty expense : During 2018 Lovely sold 1,600 units of inventory at a selling price of $125 per unit. What amount should Lovely report as warranty expense
Calculate the net after-tax return on the nonqualified : Discuss the pros and cons of purchasing the nonqualified rather than the bank-qualified municipal described in the previous problem
Penetration testing tools : Penetration Testing Tools - another web security application testing tool that is pre-loaded on our virtual machines
Which capital lease is recorded as an asset on balance sheet : Which capital lease is recorded as an asset on the balance sheet in an amount equal to? the dollar amount of each lease payment multiplied by the total number
What amount is the note payable recorded : What amount is the note payable recorded at on October 1 and how much interest is recognized from October 1 to December 31
What is the avoidable interest for ABC Company : Expenditures were $7,360,000 on March 1, $6,072,000 on June 1, and $9,200,000 on December 31. What is the avoidable interest for ABC Company
What are effective ways to document the consideration : What are effective ways to document the consideration of alternatives/evidence such that the audit documentation demonstrates skeptical thinking

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze considerations for performing risk analysis

Analyze some of the possible additional considerations that may be necessary for performing risk analysis on critical infrastructure that handle hazardous.

  Discussion on mobile users and data security

The Topic is: Mobile users and data security. Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded.

  Structure for the task of implementing

Draft a work breakdown structure for the task of implementing and using a PC-based virus detection (one that is not centrally managed)

  Most difficult type of cyber attack to defend against

Consider how this information could be used by an organization for its security program. Was anything surprising to you - Post a message to the forum regarding your experience with any of the cyber attacks described in the text.

  Develop the data center design and security plan

Develop the data center design and security plan. Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.

  3809ICT Applied Network Security Assignment

3809ICT Applied Network Security Assignment Help and Solution, Griffith University - Assessment Writing Service - write a report of your penetration test result

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Personal information entered on these websites become

facebook email electronic commerce and collaborative sites for both work and leisure are a normal part of our everyday

  Analyse a given sample of malware

Cyber Crime Malware Assignment - Malware Analysis & Reverse Engineering. The aim of this assessment is to analyse a given sample of malware

  Evaluate the strengths and weaknesses of the organizations

Evaluate the strengths and weaknesses of the organizations cybersecurity policy along attributes - Analyze the range of organizational policies (the policy framework) that are needed to effectively manage cybersecurity risks.

  Explain the symmetric and asymmetric encryption

If you were part of a government entity, what would you say about the potential benefits and drawbacks of encryption?

  Develop a detailed capstone project proposal and plan

Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd