Title: WebGoat
1WebGoat
2Contents
- Overview
- Environment
- Install Required Software
- Install WebGoat
- Getting Started
- Usage of WebGoat
- Example
3Overview
- Illustrate Typical Security Flaws within
Web-Applications - Teach a Structured Approach to Testing and
Exploiting - Give Practical Training and Examples
4Environment
- OS
- Red Hat Linux 7.3 (2.4.18-3)
- Required Software
- Java Development Kit
- Apache Ant 1.6.1
- Tomcat 5.0.25
5Install Required Software
- Java 2 SDK, Standard Edition 1.4.2_04
- http//java.sun.com/
6Install Required Software (cont.)
7Install Required Software (cont.)
- Installing JDK RPM Package
8Install Required Software
- Downloading Apache ANT 1.6.1
- http//ant.apache.org/srcdownload.cgi
9Install Required Software (cont.)
10Install Required Software (cont.)
- Building and Installing Apache Ant
11Install Required Software (cont.)
- Downloading Tomcat 5
- http//jakarta.apache.org/site/sourceindex.cgi
12Install Required Software (cont.)
- Uncompressing the Package
13Install Required Software (cont.)
- Building All Components of Tomcat 5
14Install Required Software (cont.)
15Install Required Software (cont.)
16Install WebGoat
- Download WebGoat Source Distribution
- http//www.owasp.org/development/webgoat
17Install WebGoat (cont.)
- Put catalina-ant.jar into /usr/local/ant/lib
18Install WebGoat (cont.)
- Unpacking the WebGoat src Distribution
19Install WebGoat (cont.)
- Modify catalina.home property in build.xml to
specify tomcat installation directory
20Install WebGoat (cont.)
- Add ltuser name"webgoat" password"webg0_at_t
roles"admin,manager,standard,tomcat"/gt to the
tomcat_home/conf/tomcat-users.xml file
21Install WebGoat (cont.)
- Uncomment the invoker mapping in web.xml
22Install WebGoat (cont.)
23Install WebGoat (cont.)
- Create a New WebGoat .war File
24Install WebGoat (cont.)
25Getting Started
- Running Tomcat 5 and Trying http//server_ip808
0/WebGoat/attack
26Usage of WebGoat
Lesson Plans
27Lesson Plans
- Http Basics
- How to Perform Database Cross Site Scripting
(xss) - How to Spoof an Authentication Cookie
- How to Exploit Hidden Fields
- How to Discover Clues in the HTML
- How to Perform Parameter Injection
- How to Perform SQL Injection
- How to Exploit Thread Safety Problems
- How to Exploit Unchecked Email
- How to Spoof an Authentication Cookie
- Putting it all together
28Lesson Plans (cont.)
29Example SQL Injection
30Example SQL Injection (cont.)
31Example SQL Injection (cont.)
32Example SQL Injection (cont.)
33Example SQL Injection (cont.)
34Example SQL Injection (cont.)