Pentesting On Web Applications Using Ethical Hacking: Rina Elizabeth Lopez de Jimenez
Pentesting On Web Applications Using Ethical Hacking: Rina Elizabeth Lopez de Jimenez
Hacking
Rina Elizabeth Lopez de Jimenez
Escuela de Computacion
Itca-Fepade
Santa Tecla, EI Salvador
[email protected]
Abstract- This article focuses on the knowledge of the • "Safety Test where evaluators copied real attacks to
technique Pentesting on web applications, discusses the different subvert security features of an application , system or
phases, most common of these attacks can be victims as well as network ( NIST- National Institute of Standards and
upgrades software tools to make a penetration test- or Pentesting. Technology).
A. Concepts
• "It is the method for evaluating a system or network by
simulating an attack of hostile origin[l] .
can not be viewed by unauthorized users or intruders • Grey Box Penetration Testing
who control the flow of traffic across a network.
Encryption is often used to enforce confidentiality. �
GBlind Gray Box Tandem
• Integrity: is the guarantee that the data are protected
against possible accidental or deliberate modifications
(malicious).
Cross-Site This type of attack allows the attacker to send HTTP requests
Request Forgery at will from the victim machine. • White Box Penetration Testing: This is a
comprehensive testing, as tester has been provided
HTTP requests A more sophisticated than the previous attack is to send false with whole range of information about the systems
counterfeited requests using special tools for this purpose. and/or network such as Schema, Source code, OS
details, IP address, etc. It is normally considered as a
simulation of an attack by an internal source. It is
C. Attacks through database.
also known as structural, glass box, clear box, and
Most web applications today are transporting, creating and
open box testing.
showing a lot of information from databases, so maintain the
White box penetration testing examines the code
integrity and reliability of itself becomes an important issue
coverage and does data flow testing, path testing,
when it comes to security. In the following outline major
loop testing, etc.
attacks involving databases are displayed.
Acti�ion Attempts tester may choose to test only those which contain
potential vulnerabilities.
..
• Active Intrusion Attempts
This is the most important step that has to be perfonned with
due care. This step entails the extent to which the potential
Fig. 3. Main Stages of Pentesting
vulnerabilities that was identified in the discovery step which
possess the actual risks. This step must be performed when a b. Authentication Testing
verification of potential vulnerabilities is needed. For those c. Authorization Testing
systems having very high integrity requirements, the potential d. Session Management Testing
vulnerability and risk needs to be carefully considered before e. Business Logic Testing
conducting critical clean up procedures. f. Data Validation Testing
g. Denial of Service Testing
• Final Analysis h. Web Services Testing
This step primarily considers all the steps conducted 1. Ajax Testing [6]
(discussed above) till that time and an evaluation of the
vulnerabilities present in the form of potential risks. Further, • OSSTMM (Open Source Security Testing
the tester recommends to eliminate the vulnerabilities and Methodology Manual)
risks. Above all, the tester must assure the transparency of the It is one of the most complete professional standards and
tests and the vulnerabilities that it disclosed. commonly used in security audits to review the Systems
Security from the Internet. It includes a framework that
• Report Preparation describes the steps that would be made for the implementation
Report preparation must start with overall testing procedures, of the audit.
followed by an analysis of vulnerabilities and risks. The high
risks and critical vulnerabilities must have priorities and then • ISSAF ((Information Systems Security Assessment
followed by the lower order. Framework)
The Security Assessment Framework Information Systems is
However, while documenting the final report, the following a structured methodology for safety analysis in multiple
points needs to be considered: domains and specific details of test or tests for each of these. It
a. Overall summary of penetration testing. aims to provide very detailed procedures for the testing of
b. Details of each step and the information gathered information systems that reflect real situations.
during the pen testing. ISSAF is used mostly to meet the assessment requirements of
c. Details of all the vulnerabilities and risks discovered. organizations and can also be used as a reference for new
d. Details of cleaning and fixing the systems. implementations related to information security. [6]
e. Suggestions for future security. [5]
Active phase. It also has a scanner integrated own ports, which although not
The "tester" begins to test all recommended in this process
replace nmap (nmap.org) Current transition a state of ports
methodology. This phase focuses specifically on 9
that are exposed. It also has several independent tools to
subcategories of 66 processes:
perform specific tasks such as Fuzzer HTTP, HTTP Editor,
Authentication Tester, etc.
a. Configuration Management Testing (Information gat
hering + configuration management).
• SQLmap maintained by Offensive Security, a leading information
Developed by Bernardo Damele and Miroslav Stampar, security training company.
sqlmap is a tool that no auditor web application must do
without. Kali Linux was released on the 13th March, 2013 as a
It is an open source and free web-based tool that automates complete, top-to-bottom rebuild of Backtrack Linux, adhering
command line detecting and exploiting SQL Injection completely to Debian development standards.
vulnerabilities and extracting information from databases.
Currently it supports: a. More than 600 penetration testing tools
a. MySQL included: After revlewmg every tool that was
b. Oracle included in BackTrack, we eliminated a great number
c. PostgreSQL of tools that either simply did not work or which
d. Microsoft SQL Server duplicated other tools that provided the same or
Also partially it supports other DBs as: similar functionality.
a. Microsoft Access b. Free (as in beer) and always will be: Kali Linux, like
b. DB2 BackTrack, is completely free of charge and always
c. Informix will be. You will never, ever have to pay for Kali
d. Sybase Linux.
e. Interbase c. Open source Git tree: We are committed to the open
source development model and our development
tree is available for all to see. All of the
source code which goes into Kali Linux is available
for anyone who wants to tweak
or rebuild packages to suit their specific needs.
d. FHS compliant: Kali adheres to the Filesystem
Hierarchy Standard, allowing Linux users to easily
locate binaries, support files, libraries, etc.
e. Wide-ranging wireless device support: A regular
sticking point with Linux distributions has been
supported for wireless interfaces. We have built Kali
Linux to support as many wireless devices as we
possibly can, allowing it to run properly on a wide
variety of hardware and making it compatible with
numerous USB and other wireless devices. [9]
11 .... •.... -
• What Web
.. .....
This tool is useful for one of the first steps in an audit or 11 1· " .... _
.-.
•• 1· ...................
whether the "target" uses any Content Manager (CMS) .0.- .... .,.,_ .. <10(_ .....
g ...,.-
0"-
platform Blog, Servers, Javascipts, etc. ,,�-
" ......
Q50___
Previous work recommended for recognition of what is going
to be tested.