Module 7 Security Misconfiguration Lab
Module 7 Security Misconfiguration Lab
Module 7 Security Misconfiguration Lab
Description: In this lab, you will identify and exploit a security misconfiguration in a Web
application.
Requirements: You will need access to the Cybrary lab environment for this lab.
Step 3: When the lab opens, you will see a pop-up box. Select the Next button, then Ok to
close the pop-up box.
Step 4: You will then be taken to the Kali Linux log in screen.
Step 5: Enter a username of student and a password of student to log into the desktop.
Step 6: Next, launch Firefox by clicking on the orange-colored icon near the top-left of the
screen. This will launch the mutillidae page.
Step 7: In the URL bar, type the following and press Enter.
http://mutillidae/mutillidae/includes/
Step 8: Click the Mutillidae icon at the top-left of the browser to go back to the main
mutillidae page.
Step 9: Next, click on OWASP 2017
Step 10: Click A6 – Security Misconfiguration
Step 11: Click Method Tampering (GET for POST)
Step 12: Next, click Poll Question
Step 13: You will be taken to the User Poll page.
Step 14: Minimize the Firefox window
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Step 15: Next, click on the Burp Suite icon on the left-side.
Step 16: A pop-up box will open
Step 17: Uncheck the “Help improve Burp…” checkbox.
Step 18: Click the “I Accept” button to accept the license agreement.
Step 19: Click the Next button
Step 20: Next, click the Start Burp button
Step 21: Next, click the Proxy tab at the top-left
Step 22: Next, click the “Intercept is on” button to turn off the intercept.
Step 23: Minimize Burp Suite
Step 24: Click back on Firefox
Step 25: Right-click the FoxyProxy icon to the right of the URL address bar.
Step 26: Select the “Use proxies based on pre-defined patterns and priorities.”
Step 27: Back on the User Poll page, select kismet and enter anything you want in the
initials box.
Step 28: Click the Submit Vote button.
Step 29: Minimize Firefox
Step 30: Click back on Burp Suite
Step 31: Click on the HTTP History tab at the top-left.
Step 32: Next, right-click on the http://mutillidae and select “Send to Repeater” from the
menu.
Step 33: Next, click the Repeater tab at the top.
Step 34: We now see the information from the poll. It was sent to the Web application
using a GET request.
Step 35: Now, let’s see if the application allows any request method to be used. We will
change the method to POST.
Step 36: On the bottom line, change the “kismet” to “telnet.”
Step 37: Next, change the initials you used before.
Step 38: Click the Go button to send your changes to the server.
Step 39: Next, minimize Burp Suite
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Step 40: Click back on Firefox
Step 41: Select tcpdump and click Submit Vote.
Question 2:Do you see the telnet entry that you submitted via a POST request in Burp Suite?
____________________________________________________________
Question 3: Do you see the file path that the backdoor.php file has been moved to?
_______________________________________________________________
Step 51: Next, type the following in the URL bar and press Enter.
http://mutillidae/mutillidae/index.php?page=/tmp/backdoor.php&cmd=id
Step 52: Note the “www-data” in the results. This shows that we can run any command by
replacing the “cmd” parameter, which means we can potentially gain full control over the
Web server operating system.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4