Lab Assignment Number Module 5 Lab Assignment 1
Lab Assignment Name Module 5 Lab Assignment 1
Screenshots (Paste at least 5 screenshots here):
Lab Observations/Information Gathered.
1. In this particular situation, we harnessed the capabilities of OWASP ZAP to exploit a vulnerability
known as session hijacking. This involved a clever maneuver where we replaced the content of a
seemingly innocuous and empty site, "darkcodes.icu," with the legitimate and trusted
"www.goodshopping.com." The end result was a bit of a digital sleight of hand, tricking the user's
web browser into thinking it was interacting with "darkcodes.icu," when in reality, all the behind-the-
scenes action was unfolding on the "www.goodshopping.com" domain. This incident underscores the
critical importance of having strong session management practices and robust security measures in
place within web applications. These defenses are essential to thwart attempts like session hijacking
and other cyber threats that exploit vulnerabilities.
Let’s talk about that filter we used: http.host != http.host:www.goodshopping.com. Think of it as a
vigilant gatekeeper that stands guard over incoming HTTP requests. Its job is to scrutinize the "host
header," which essentially points to the destination web server. Whenever this filter spots a host
header that does not match our expected "www.goodshopping.com," it raises a metaphorical flag,
indicating the possibility of something suspicious is going on like someone trying to communicate
with an unauthorized or unexpected destination. Now, imagine this scenario: you spot a full URI
request that does not fit within the filter's parameters. It is like finding a mysterious message that
somehow slipped through the gatekeeper's watchful eye. This could be a hint that there is more
happening behind the scenes, perhaps data being transmitted away without permission or
unauthorized access attempts. I had no experience with this tool in my previous jobs so this was a
good insight into spoofing a connection and a MITM attack.
Lab Assignment Submission Template
References:
EC-Council (2020). Certified Ethical Hacker (CEH) Version 11 w/ iLabs (Volumes 1 through 4).
International Council of E-Commerce Consultants (EC
Council). https://bookshelf.vitalsource.com/books/9781635675160