Hacking the Juice Shop: Information Gathering

Hacking the Juice Shop: Information Gathering

The?Juice Shop?is an intentionally vulnerable web application developed by the Open Web Application Security Project (OWASP). It has a series of challenges that allow hackers to learn how to exploit many of the vulnerabilities that fall under the OWASP Top 10.

I’m going to be posting a series of articles that effectively documents a miniature penetration test, which, generally speaking, consists of the following stages:

  1. Pre-engagement Interactions
  2. Reconnaissance / Information Gathering
  3. Scanning
  4. Vulnerability Assessment
  5. Exploitation
  6. Reporting

These phases aren’t always linear. It’s best to think of it as an iterative process. For example: scanning, enumeration and exploitation can all provide additional insights about the system under test, so as hackers we are constantly gathering information which can be used to perform further exploits.

PRE-ENGAGEMENT INTERACTIONS

I am studying to become a penetration tester, so this series is my attempt at showcasing my skills through the entire lifecycle of an engagement.

However, as a working mom, I simply don’t have the time or resources to dedicate to simulating a complete, full-scale penetration test.

One of the first steps involved in penetration testing (pre-engagement) is defining scope. Let’s do that.

I will focus solely on the Juice Shop application, not to include white box testing (SAST), or attacking the associated operating system/network.

I will document only a small portion of each stage and the vulnerabilities/exploits available on Juice Shop.

I will be using Kali Linux as the attacking machine, using a docker container to locally host the vulnerable web application Juice Shop.

I will publish a more detailed version of my findings on my blog, Technodivergent.

INFORMATION GATHERING

One of the first tasks is to attempt to gather fingerprints. I tried to gather more details about the web server, what kind of HTTP requests we can make, and what do the responses look like for a variety of cases.

Next, I manually poked around the website to glean any information I could from well-known text files hosted on the web server. Then I used the website like a user would. This revealed a lot of information about how potential usernames worth targeting.

All of this information gathering helped me to identify the various technologies that Juice Shop uses for the front- and backend, as well as discovering API endpoints.

It’s important to note that the information gathering phase is also an iterative process. Additional information can be learned throughout the entire lifecycle of a penetration test. Enumeration and exploitation can be especially useful for learning more in-depth information about the system under test.

The next article in this series will focus on the enumeration or scanning phase of penetration testing, where I discovered a wide variety of directories, endpoints and API calls worth investigating further.

要查看或添加评论,请登录

Kassidy Hall的更多文章

  • Testing WhatPulse Web Application Security

    Testing WhatPulse Web Application Security

    Background I have been using WhatPulse for over 17 years. WhatPulse, first released in 2003, is a client capable of…

    4 条评论
  • Multi-threaded Port Scanner

    Multi-threaded Port Scanner

    One of the core functions performed during network reconnaissance is identifying open ports on a target host. There…

    1 条评论
  • RouterOS-Scanner for MikroTik Devices

    RouterOS-Scanner for MikroTik Devices

    During early March 2022, Microsoft released a security tool to scan for vulnerabilities associated with Mikrotik…

  • Introduction to REST API Concepts

    Introduction to REST API Concepts

    This article is a brief introduction to the REpresentational State Transfer (REST) architecture. It is intended for…

    1 条评论
  • Agile & Scrum for Newbies

    Agile & Scrum for Newbies

    Agile is a framework for methodologies that follow the Agile manifesto. One of the most common Agile methodologies in…

  • Overview of the NIST Cybersecurity Framework

    Overview of the NIST Cybersecurity Framework

    What is the NIST CSF? The Cybersecurity Framework (CSF) is a collection of standards, guidelines and best practices…

    2 条评论
  • Two-Step Verification vs. Two-Factor Authentication

    Two-Step Verification vs. Two-Factor Authentication

    In February 2022, Google announced they have seen a 50% decrease in account compromises since auto-enrolling users in…

    2 条评论

社区洞察

其他会员也浏览了