This time i show YAWAST (Antecedent Web Application Security Toolkit) on Debian 8.6. YAWAST performs basic checks for penetration testers and security auditors.
System preparation
# update and upgrade system
$ apt-get update && apt-get upgrade
# install needed packages
$ apt-get install -y build-essential libssl-dev
# download ruby archive
$ wget https://cache.ruby-lang.org/pub/ruby/2.3/ruby-2.3.1.tar.gz
# unzip archive
$ tar -zxvf ruby-2.3.1.tar.gz
# change directory
$ cd ruby-2.3.1/
# run configuration
$ ./configure
# run compilation
$ make
# run intsallation
$ make install
# check version
$ ruby --version
Install YAWAST
# install YAWAST via gem
$ gem install yawast
# show help
$ yawast --help
Today we build a penetration test environment via Docker. That means no Plug-Ins (for example: Java) are needed! If you are Mac OS X users, a VNC client is already included (since Yosemite).
Preparation:
# download all needed Docker images
$ docker pull owasp/zap2docker-stable
$ docker pull citizenstig/dvwa
$ docker pull jmbmxer/threadfix
# list local Docker images
$ docker images
...
REPOSITORY TAG IMAGE ID CREATED SIZE
owasp/zap2docker-stable latest a774bdc65502 3 months ago 1.557 GB
jmbmxer/threadfix latest b6f1907a61cd 5 months ago 941 MB
citizenstig/dvwa latest c8312743bc09 23 months ago 478.5 MB
ZAP Attack Proxy
# run Docker container with ZAP Attack Proxy (insert and remember password)
$ docker run -u zap -p 5900:5900 -p 8080:8080 -v /tmp/reports:/home/zap/reports --name zap -i owasp/zap2docker-stable x11vnc --forever --usepw --create
# start VNC (Mac OS X)
$ open /System/Library/CoreServices/Applications/Screen\ Sharing.app/
…or use the short way via: [cmd] + [space] and type screen sharing
Insert “localhost” and your given password… and follow introduction for ZAP startup. Now you configure the ZAP Proxy Settings.
Note: Select IP “0.0.0.0” for later use. You can also use “$ docker inspect zap” to find out the internal IP, but this could change on next start.
DVWA
# run Docker container with DVWA (2nd terminal)
$ docker run -d -p 8081:80 --name dvwa citizenstig/dvwa
# wait for startup
$ docker logs -f dvwa
# get host ip (from where you run browser)
$ ifconfig
Now start your Firefox browser and change proxy settings. Insert your IP!
Call URL for DVWA in Firefox and run your penetration tests.
When you are done, export XML report
From now on, you can stop all running docker container.
ThreadFix
# run Docker container with ThreadFix
$ docker run -d -p 8443:8443 --name threadfix jmbmxer/threadfix start
# wait for startup
$ docker logs -f threadfix
Open Safari and call URL: https://localhost:8443/threadfix. Login with User: “user” and Password: “password”. Create a new team and add a application to team.
# open directory in finder
$ open /tmp/reports/
Import the ZAP XML report.
That is it… enjoy and expand your pentest laboratory!
Today’s tutorial shows how quickly and easily a Docker port scanner can be created. With the knowledge you can then create additional Docker applications.
What happens when users make a typo in URL input? It can display a fake websites. This similar-looking domains can be used to attack you (Domain Name Permutation). With dnstwist you can find such “evil neighbors”. This tutorial shows how to use in a few seconds dnstwist.
This time i will show you, how to install Aircrack-ng on CentOS 7. My CentOS 7 (CentOS Linux release 7.2.1511 x64) is a virtual maschine on VirtualBox (5.0). As wireless USB Adapter i use TP-Link TL-WN822N.