Part 1: Nikto: Module 4 Sensitive Data Exposure Lab
Part 1: Nikto: Module 4 Sensitive Data Exposure Lab
Module 4 Sensitive Data Exposure Lab
Description: In this lab, you will learn some common places to look for sensitive data. We
will use a tool called Nikto to look for sensitive data. Nikto is commonly used in penetration
testing to gain information about Web applications. We will also use a tool called Dirbuster
that uses a wordlist to scan for any files or directories that exist on the website. Finally, in
Part 3, we will review an error message to see if any sensitive data is being exposed.
Requirements: You will need access to the Cybrary lab environment for this lab.
Part 1: Nikto
Step 1: Log into Cybrary.
Step 2: Launch the OWASP Broken Authentication lab by searching for it in the catalog
and selecting the launch button
Note: It may take 30-40 seconds for the lab to launch after clicking the button.
Step 3: When the lab opens, you will see a pop-up box. Select the Next button, then Ok to
close the pop-up box.
Step 4: You will then be taken to the Kali Linux log in screen.
Step 5: Enter a username of student and a password of student to log into the desktop.
Step 6: Next, launch the Terminal window by clicking the black-colored menu icon on the
left-side.
Step 7: Next, type the following command at the prompt and press Enter. nikto -host
http://mutillidae/mutillidae/
Note: It may take 30 seconds to a minute to run the scan.
Step 8: Next, launch Firefox by clicking the orange-colored icon on the left-side menu bar.
Step 9: In the URL bar, type the following and press Enter.
http://mutillidae/mutillidae/robots.txt
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Question 2: Do you see any files or directories after visiting the URL? _____________
Step 10: Next, replace the robots.txt in the URL bar with passwords/ and press Enter.
Question 3: Do you see any files listed on the page? ___________________________
Question 5: Are you able to access the interface for the database or do you get an error message?
_______________________________________________________
Question 6: Do you see the .git directory in the results? _______________________
Note: A git directory may contain all of the site’s source code, which would allow an
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Part 2: DirBuster
Step 1: At the Terminal prompt, type clear and press Enter.
Step 2: Next, type dirbuster and press Enter. Note: It may take 15-20 seconds, but
eventually a GUI should launch for DirBuster.
Step 3: Under the “Target URL” field, type the following. http://mutillidae/
Step 4: Next, change the “Number of Threads” slider from 10 Threads to 50 Threads.
Step 5: Under the “File with list of dirs/files” browse to the following location and then
select directory-list-2.3-medium.txt. Click the select list button.
/usr/share/wordlists/dirbuster/
Step 6: Next, uncheck the box labeled as “Be Recursive”
Step 7: In the “Dir to start with” box, type /mutillidae/
Step 8: Next, click the Start button
Note: It may take several minutes for DirBuster to complete its scan.
Step 9: Click on the “Results-List View tab at the top to review the results at any time
during the scan.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Question 3: Does the error message show you the SQL query being used?
________________________________________________________________
Question 4: What other information do you see in the error message? __________
______________________________________________________________________
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4