Skip to content

Commit a11c74c

Browse files
Merge pull request #28 from lukasz-a-krol/main
images for assessment learning path
2 parents fb316d8 + 5ea4eb7 commit a11c74c

22 files changed

+18
-18
lines changed

content/learning-path/5/module-1.en.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -63,28 +63,28 @@ Two popular intercepting web proxies used for security assessments are Portswigg
6363

6464
To get started with Burp, you must first [download it](https://portswigger.net/burp/releases/community/latest). Once you’ve got it downloaded and installed, open the application. Before you start using Burp, it will prompt you to specify a project and a configuration. Projects let you keep track of your progress testing a site between sessions, but are not supported in the free edition, so just select “Temporary project”. You can also specify different sets of configurations, for now just select “Use Burp defaults.”
6565

66-
![alt_text](/media/uploads/image1.png "image_tooltip")
66+
![alt_text](/media/uploads/web_security_assessment_burp1.png "image_tooltip")
6767

68-
![alt_text](/media/uploads/image2.png "image_tooltip")
68+
![alt_text](/media/uploads/web_security_assessment_burp2.png "image_tooltip")
6969

7070
This will take you to the main Burp window. The primary tabs that you’ll be using are the “Proxy” and “Intruder” tabs. For now, switch to the Proxy tab and click the “Open Browser” button. This will open a Chromium instance that’s fully configured to use Burp. This embedded browser is configured to use Burp as its proxy and has its TLS configuration changed to allow Burp to intercept encrypted traffic. You can use this browser instance for testing web applications while you use your normal browser for general browsing.
7171

72-
![alt_text](/media/uploads/image3.png "image_tooltip")
72+
![alt_text](/media/uploads/web_security_assessment_burp3.png "image_tooltip")
7373

74-
![alt_text](/media/uploads/image4.png "image_tooltip")
74+
![alt_text](/media/uploads/web_security_assessment_burp4.png "image_tooltip")
7575

7676
For now, type the URL of any website into Burp’s embedded browser and hit enter. You’ll note that nothing happens in the browser. Switch back to Burp, and you’ll see the HTTP request that the browser sent, and a button lit up that says “Intercept is on.” What has happened is that Burp has received the request from your browser but has not forwarded it to the web server. Instead, it’s allowing you to inspect and modify the request. For now, click the “intercept is on” button to turn off interception. If you look at Burp’s embedded Chromium, you should see the web page loaded. Switch back to Burp, and click the “HTTP History” sub-tab of the Proxy tab. You will see a log of all the HTTP requests that your browser has sent. If you click on one, you can see the full request, and also the response from the server.
7777

78-
![alt_text](/media/uploads/image5.png "image_tooltip")
78+
![alt_text](/media/uploads/web_security_assessment_burp5.png "image_tooltip")
7979

8080
If you want to modify a request that’s already been sent, right-click that request and select “Send to Repeater”. Switch to the Repeater tab, and you will see the request on the left. A good practice is to immediately click the “Send” button to get a normal response. You can then edit the request, and send the edited request. You can use the “<” and “>” buttons to see prior requests and responses. Using the repeater tab is extremely important when performing security assessments, as you will see in the later subtopics.
8181

82-
![alt_text](/media/uploads/image6.png "image_tooltip")
82+
![alt_text](/media/uploads/web_security_assessment_burp6.png "image_tooltip")
8383
z
8484

8585
One important feature of the Repeater interface is the “URL-encode as you type” feature. This will automatically encode characters as you type them, saving you many mistakes and a lot of time. Depending on what you’re modifying, you will either want this feature on or off. To change the setting, right-click on the Request pane and select the menu item.
8686

87-
![alt_text](/media/uploads/image7.png "image_tooltip")
87+
![alt_text](/media/uploads/web_security_assessment_burp7.png "image_tooltip")
8888

8989
This will get you started with Burp Suite. The free Community Edition is enough for this learning path, although most people who get paid to perform security assessments of websites elect to subscribe to the Professional Edition. Both the free and paid version include a large number of features, which are documented on the [Portswigger website](https://portswigger.net/burp/documentation). You’ll be going much more in depth into Burp in most of the following subtopics (though you can use any proxy you want, if you prefer).
9090

@@ -94,15 +94,15 @@ For all of the subtopics about vulnerability classes, the vast majority of the r
9494

9595
In the subtopics below, each subtopic will assign a section of reading and labs from the PortSwigger Academy. When you’re completing those assignments, be sure to go through all the pages and complete all of the “apprentice” level labs. You should also attempt all of the “practitioner” level labs, but try not to get hung up on any one lab. If you get stuck on a particular practitioner lab, simply move on, and come back to it before you complete the final skill validation exercise of the learning path.
9696

97-
![alt_text](/media/uploads/image8.png "image_tooltip")
97+
![alt_text](/media/uploads/web_security_assessment_PortSwigger_screenshot1.png "image_tooltip")
9898

9999
The PortSwigger Academy XSS topic. Be sure to go through all the subtopics. “What is XSS” through “Testing” are all one web page, but each subtopic is its own page.
100100

101-
![alt_text](/media/uploads/image9.png "image_tooltip")
101+
![alt_text](/media/uploads/web_security_assessment_PortSwigger_screenshot2.png "image_tooltip")
102102

103103
The PortSwigger Academy Reflected XSS subtopic. Note the lab linked towards the bottom of the screenshot.
104104

105-
![alt_text](/media/uploads/image10.png "image_tooltip")
105+
![alt_text](/media/uploads/web_security_assessment_PortSwigger_screenshot3.png "image_tooltip")
106106

107107
After completing a topic (e.g. XSS), double-check your lab completion by checking the “View all _topic_ labs” link. This will let you see any labs that you missed.
108108

content/learning-path/5/module-6.en.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you were testing a forum website that allowed multiple sub-forums, you might
4646

4747
Once you’ve got the user accounts you need, you can start making a site map. The site map will guide your testing, and will function as your checklist for testing. As as example, you might produce something like this:
4848

49-
![alt_text](/media/uploads/image1.png "image_tooltip")
49+
![alt_text](/media/uploads/web_security_assessment_testing_table1.png "image_tooltip")
5050

5151
This shows every page you’ve found in the app (“URL” column), its logical navigation, whether the content of the page changes depending on its parameters (“User-specific?” column), and then whether each user type has access to the URL. There’s also a “notes” column for you to collect important info about the page, e.g., if the profile page shows very different content depending on the user of the person viewing the page or if data input on one page shows up on another. Some sites may not fit nicely into this particular structure. That’s fine, the structure should be specific to the site, so feel free to change it. However, something like this should work for most sites.
5252

@@ -64,7 +64,7 @@ Most people elect to keep their notes from these tests in a text file, as oppose
6464

6565
Now that you understand the site, you can dive into the biggest part of testing the site: testing every page (and every input) for the full battery of tests in the rest of the methodology. This is going to be a lot to keep track of, and if you don’t stay focused and keep track, you will miss things. Fortunately, you’ve prepared a spreadsheet. All you need to do is expand that spreadsheet and you’ve got a full checklist:
6666

67-
![alt_text](/media/uploads/image2.png "image_tooltip")
67+
![alt_text](/media/uploads/web_security_assessment_testing_table2.png "image_tooltip")
6868

6969
This might seem daunting, but every cell in that sheet is a small, discrete chunk of work that should take a bounded amount of time. It’s usually more effective to go through the site filling out rows first; choose a page and go through the entire methodology, rather than performing one test throughout the entire site. As you go, put something like a “√” in cells as you complete them, or something like “n/a” if the tests don’t apply. Over the hours and days, your checklist will get filled in, and you can be confident that you’ve performed complete testing.
7070

content/learning-path/5/module-7.en.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -104,23 +104,23 @@ ZAP (SSP’s Zed Attack Proxy) is an open-source alternative to Burp. Though mos
104104

105105
For this practice, we’ll be using ZAP’s scanner module. To get a feel for it, first, make sure you’ve got an instance of DIWA running, then simply open ZAP and click “Automated Scan”, put in the URL of your DIWA home page, and click “Attack”.
106106

107-
![alt_text](/media/uploads/image1.png "image_tooltip")
107+
![alt_text](/media/uploads/web_security_assessment_ZAP1.png "image_tooltip")
108108

109-
![alt_text](/media/uploads/image2.png "image_tooltip")
109+
![alt_text](/media/uploads/web_security_assessment_ZAP2.png "image_tooltip")
110110

111111
Since DIWA is a small app, this scan should complete rather quickly. If nothing went horribly wrong, you’ll note that ZAP’s scanner found some issues. However, unless ZAP has changed significantly, the ZAP results may be somewhat underwhelming. There may be some small issues that ZAP found and you didn’t, but ZAP should’ve missed most of the big issues you found.
112112

113113
Let’s see if we can improve this. Click the “Quick Start” button in the secondary toolbar, and then the “<” in the pane below. From there, click “Manual Explore”, put in the URL of your DIWA, and then click “Launch Browser”.
114114

115-
![alt_text](/media/uploads/image3.png "image_tooltip")
115+
![alt_text](/media/uploads/web_security_assessment_ZAP3.png "image_tooltip")
116116

117-
![alt_text](/media/uploads/image4.png "image_tooltip")
117+
![alt_text](/media/uploads/web_security_assessment_ZAP4.png "image_tooltip")
118118

119119
Click around the site a bit, and make sure that when you’re done you’re logged into the site as an administrative user. Now, go back to ZAP and launch a scan by right-clicking the DIWA site in the left bar and launching an active scan with the default setup.
120120

121-
![alt_text](/media/uploads/image5.png "image_tooltip")
121+
![alt_text](/media/uploads/web_security_assessment_ZAP5.png "image_tooltip")
122122

123-
![alt_text](/media/uploads/image6.png "image_tooltip")
123+
![alt_text](/media/uploads/web_security_assessment_ZAP6.png "image_tooltip")
124124

125125
This scan should take significantly longer and give significantly different better results. Why did this happen? Launching the scan from a site you’ve visited in the “Sites” section gives the scanner a lot more information than the fully automated scan gets. In fact, the results you get from the scanner may differ greatly based on how you manually explore the site prior to running the scan.
126126

449 KB
Loading
426 KB
Loading
147 KB
Loading
270 KB
Loading
293 KB
Loading
572 KB
Loading
581 KB
Loading

0 commit comments

Comments
 (0)