0% found this document useful (0 votes)
114 views

Part 1: Nikto: Module 4 Sensitive Data Exposure Lab

This document provides instructions for a lab on identifying sensitive data exposure. The lab involves using tools like Nikto and Dirbuster to scan a vulnerable website for sensitive files and directories. Nikto found files like robots.txt and .git while Dirbuster found additional files. Viewing an error message revealed that the site was vulnerable to SQL injection and exposed the full SQL query and other data in the error message.

Uploaded by

Taha Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Part 1: Nikto: Module 4 Sensitive Data Exposure Lab

This document provides instructions for a lab on identifying sensitive data exposure. The lab involves using tools like Nikto and Dirbuster to scan a vulnerable website for sensitive files and directories. Nikto found files like robots.txt and .git while Dirbuster found additional files. Viewing an error message revealed that the site was vulnerable to SQL injection and exposed the full SQL query and other data in the error message.

Uploaded by

Taha Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

 

 
 

 
Module 4 Sensitive Data Exposure Lab

Description: In this lab, you will learn some common places to look for sensitive data. We
will use a tool called Nikto to look for sensitive data. Nikto is commonly used in penetration
testing to gain information about Web applications. We will also use a tool called Dirbuster
that uses a wordlist to scan for any files or directories that exist on the website. Finally, in
Part 3, we will review an error message to see if any sensitive data is being exposed.
Requirements:​ You will need access to the Cybrary lab environment for this lab.

Part 1: Nikto  
Step 1:​ Log into Cybrary.
Step 2:​ Launch the ​OWASP Broken Authentication​ lab by searching for it in the catalog
and selecting the launch button
Note: It may take 30-40 seconds for the lab to launch after clicking the button.
Step 3:​ When the lab opens, you will see a pop-up box. Select the Next button, then Ok to
close the pop-up box.
Step 4:​ You will then be taken to the Kali Linux log in screen.
Step 5:​ Enter a username of ​student ​and a password of ​student ​to log into the desktop.
Step 6:​ Next, launch the Terminal window by clicking the black-colored menu icon on the
left-side.
Step 7:​ Next, type the following command at the prompt and press Enter. nikto -host
http://mutillidae/mutillidae/
Note: It may take 30 seconds to a minute to run the scan.

Question 1:​ Do you see a robots.txt file in the results? ________________________

Step 8:​ Next, launch Firefox by clicking the orange-colored icon on the left-side menu bar.
Step 9:​ In the URL bar, type the following and press Enter.
http://mutillidae/mutillidae/robots.txt

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 
 
 

Question 2:​ Do you see any files or directories after visiting the URL? _____________

Step 10:​ Next, replace the robots.txt in the URL bar with ​passwords/​ and press Enter.

Question 3:​ Do you see any files listed on the page? ___________________________

Step 11:​ Next, click on the ​accounts.txt​ file.

Question 4:​ Do you see any usernames or passwords? _________________________

Step 12:​ Click the back button on the browser.


Step 13:​ Next, replace the passwords/ in the URL with ​phpmyadmin/​ and press Enter.

Question 5:​ Are you able to access the interface for the database or do you get an error message?
_______________________________________________________

Step 14:​ Minimize Firefox.


Step 15:​ Back at the Terminal window, let’s keep reviewing the Nikto scan results.
Step 16:​ Scroll down the results and look for the ​phpinfo.php​ file.
Note: This file is typically used to debug the server, while it is being constructed (prints
diagnostic information), but it should not be accessible to users.
Step 17:​ Continue looking through the Nikto results.

Question 6:​ Do you see the .git directory in the results? _______________________
Note: A git directory may contain all of the site’s source code, which would allow an

attacker to clone the site and also access historical information.

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 
 
 

Part 2: DirBuster 
 
Step 1:​ At the Terminal prompt, type clear and press Enter.
Step 2:​ Next, type ​dirbuster ​and press Enter. Note: It may take 15-20 seconds, but
eventually a GUI should launch for DirBuster.
Step 3:​ Under the “Target URL” field, type the following. ​http://mutillidae/
Step 4:​ Next, change the “Number of Threads” slider from 10 Threads to 50 Threads.
Step 5:​ Under the “File with list of dirs/files” browse to the following location and then
select directory-list-2.3-medium.txt. Click the select list button.
/usr/share/wordlists/dirbuster/
Step 6:​ Next, uncheck the box labeled as “Be Recursive”
Step 7:​ In the “Dir to start with” box, type ​/mutillidae/
Step 8:​ Next, click the Start button
Note: It may take several minutes for DirBuster to complete its scan.
Step 9:​ Click on the “Results-List View tab at the top to review the results at any time
during the scan.

Question 1:​ Did DirBuster find any files? ___________________________________

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 
 
 

Part 3: Error Messages 

Step 1:​ Click back on the Firefox web browser


Step 2:​ Select the mutillidae icon on the top-left of the screen to go back to the home
page.
Step 3:​ Next, navigate to OWASP 2017.
Step 4:​ Select A1 – Injection (SQL)
Step 5:​ Select SQLi Extract Data
Step 6:​ Select User Info (SQL)
Step 7:​ At the login screen, type a single quote in the Name field and then click the View
Account Details button.

Question 1:​ Do you see an error message on the page? ________________________

Question 2: ​Is the page vulnerable to a SQL Injection attack?


_______________________________________________________________

Question 3: ​Does the error message show you the SQL query being used?
________________________________________________________________

Question 4: ​What other information do you see in the error message? __________
______________________________________________________________________

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy