Mukezh

Session Setting DVWA Wave

Apr 2nd, 2019
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.88 KB | None | 0 0
  1.  
  2. Setting up of LVS , WAVE and DVWA...
  3. For LVS
  4. =======
  5. Step 1 --> Extract the contents of LVS_1 in a folder
  6. Step 2 --> Copy that extracted forlder in C:\xampp\htdocs
  7. Step 3 --> STart XAMPP server --> Apache and MySQL
  8. Step 4 --> in the browser type --> 127.0.0.1/lvs_1
  9. lvs_1 --> Name of Extracted Folder
  10. Download Link --> https://ufile.io/aci9l
  11.  
  12.  
  13. For WAVE
  14. ========
  15. Step 1 --> Extract the contents of wave in a folder
  16. Step 2 --> Copy that extracted forlder in C:\xampp\htdocs
  17. Step 3 --> STart XAMPP server --> Apache and MySQL
  18. Step 4 --> in the browser type --> 127.0.0.1/wave1
  19. wave1 --> Name of Extracted Folder
  20. Download Link --> https://ufile.io/bk3w5
  21.  
  22. For DVWA
  23. ========
  24. Step 1 --> Extract the contents of DVWA in a folder
  25. Step 2 --> Copy that extracted forlder in C:\xampp\htdocs
  26. Step 3 --> STart XAMPP server --> Apache and MySQL
  27. Step 4 --> Open configurtion file of dvwa and delete the password field value. c:/xammp/dvwa/config/config.php
  28. Step 5 --> in the browser type --> 127.0.0.1/DVWA
  29. Step 6 --> login with the credentials --> admin
  30. password
  31.  
  32. Downloading Link --> https://ufile.io/a5lg8
  33.  
  34.  
  35. ============x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x=x==========
  36.  
  37. METHODS USED IN WEB APPLICATIONS
  38. ================================
  39. 1. GET - It is the method used by web applications.In this type of request all the request made is sent in plain text i.e. the request is visible at the address bar.It is very insecure method as if one person is shoulder surfing he will be able to grasp your credential and this method is also helpful for several attacks.
  40. eg: www.aaab.com/haha.php?id=1
  41. www.adsadsa.com/index.php?happyness=null
  42.  
  43.  
  44. 2. POST - The method which hides and requests the data from the Database or Server Secretly. eg. twitter.com/login.php
  45.  
  46. Demo...
  47.  
  48. ----------------------------------------------------------
  49.  
  50. INSECURE DIRECT OBJECT REFERENCE
  51. ================================
  52. A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.
  53. Do note here that a malicious is able to access resources of another USER only. Both have the same level of access in case of IDOR.
  54.  
  55. example :
  56.  
  57. www.hungama.com/user.php?id=1
  58. www.hungama.com/user.php?id=4
  59. www.hungama.com/user.php?id=2
  60. Without proper validation it jumps you to another account.
  61.  
  62. Wave1
  63.  
  64. ----------------------------------------------------------
  65.  
  66. SENSITIVE DATA EXPOSURE
  67. =======================
  68. Many web applications do not properly protect sensitive data such as Names, IDs, Credit Cards details, authentication credentials etc. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft or any other crimes. These Sensitive Data is well aspected to encryption also in which if the data is not encrypted and is in plain text, it will be very easier to get fetched by the attacker or any other individual.
  69.  
  70. Types of Sensitive Data
  71. =======================
  72.  
  73. 1. Personal - Names, Address , Contact Numbers etc.
  74. 2. Confidential - ID,Passwords - Credentials, Aadhar No.
  75. 3. Financial - Bank Accounts numbers, credit cards, debit cards etc.
  76.  
  77.  
  78.  
  79. HOW A SENSITIVE DATA CAN BE COMPROMISED
  80. --------=========================--------
  81.  
  82. 1. When data is transmitted in the url, that is your credentials are transmitted via GET Parameter.
  83. username=user&password=pass&sumbit=submit
  84. 2. When data is stored in plain text form rather then hashed or encrypted form.
  85. 3. When data is stored in the text file rather then to be stored in the databsae.
  86.  
  87. Id Interest Gender Username Password
  88. -----------------------------------------------
  89. 1 Badminton Female admin Pa$$woRd
  90. 2 Football Male admin2 paSSwOrd
Add Comment
Please, Sign In to add comment