Lesson Plan Title: Using an Access Control Matrix
+Concept / Topic To Teach:
+ +In role-based access control scheme, a role represents a set of access permissions and privileges. A user can be assigned one or more roles. A role-based access control normally consists of two parts: role permission management and role assignment. A broken role-based access control scheme might allow a user to perform accesses that are not allowed by his/her assigned roles, or somehow obtain unauthorized roles. +General Goal(s):
+Each user is a member of a role that is allowed to access only certain resources. Your goal is to explore the access control rules that govern this site. Only the [Admin] group should have access to the 'Account Manager' resource. + diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/BasicAuthentication.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/BasicAuthentication.html new file mode 100644 index 000000000..a656eefb5 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/BasicAuthentication.html @@ -0,0 +1,9 @@ +Lesson Plan Title: Basic Authentication
+Concept / Topic To Teach:
+ +Basic Authentication is used to protect server side resources. The web server will send a 401 authentication request with the response for the requested resource. The client side browser will then prompt the user for a user name and password using a browser supplied dialog box. The browser will base64 encode the user name and password and sendthose credentials back to the web server. The web server will then validate the credentials and return the requested resource if the credentials are correct. These credentials are automatically resent for each page protected with this mechanism without requiring the user to enter their credentials again.General Goal(s):
+For this lesson, your goal is to understand Basic Authentication and answer the questions below. + diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/BlindSqlInjection.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/BlindSqlInjection.html new file mode 100644 index 000000000..8284e4dbc --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/BlindSqlInjection.html @@ -0,0 +1,15 @@ +Lesson Plan Title: How to Perform Blind SQL Injection
+Concept / Topic To Teach:
+ +SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack. +General Goal(s):
+The form below allows a user to enter an account number and determine if it is valid or not. Use this form to develop a true / false test check other entries in the database.Lesson Plan Title: How to Exploit Buffer Overflows
+Concept / Topic To Teach:
+How to Exploit Buffer Overflows. +General Goal(s):
+This lesson needs a creator! + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ChallengeScreen.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ChallengeScreen.html new file mode 100644 index 000000000..b3d9b3321 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ChallengeScreen.html @@ -0,0 +1,7 @@ +Lesson Plan Title: Putting it all together
+Concept / Topic To Teach:
+This lesson creates a challenge that will help the student apply all that they have learned.Lesson Plan Title: How to Perform Command Injection
+Concept / Topic To Teach:
+ +Command injection attacks represent a serious threat to any parameter-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.General Goal(s):
+The user should be able to execute any command on the hosting OS. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/CrossSiteScripting.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/CrossSiteScripting.html new file mode 100644 index 000000000..760f2eb93 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/CrossSiteScripting.html @@ -0,0 +1,11 @@ +Lesson Plan Title: How to Perform Cross Site Scripting (XSS)
+Concept / Topic To Teach:
+ +It is always a good practice to scrub all inputs, especially those inputs that will later be used as parameters to OS commands, scripts, and database queries. It is particularly important for content that will be permanently stored somewhere. Users should not be able to create message content that could cause another user to load an undesireable page or undesireable content when the user's message is retrieved.General Goal(s):
+For this exercise, you will perform stored and reflected XSS attacks. You will also implement code changes in the web application to defeat these attacks. +Lesson Plan Title: Denial of Service from Multiple Logins
+Concept / Topic To Teach:
+ +Denial of service attacks are a major issue in web applications. If the end user cannot conduct business or perform the service offered by the web application, then both time and money is wasted. +General Goal(s):
+This site allows a user to login multiple times. This site has a database connection pool that allows 2 connections. You must obtain a list of valid users and create a total of 3 logins. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/Encoding.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/Encoding.html new file mode 100644 index 000000000..fcba2ddac --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/Encoding.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Peform Basic Encoding
+Concept / Topic To Teach:
+ +Different encoding schemes can be used in web applications for different reasons. + +General Goal(s):
+This lesson will familiarize the user with different encoding schemes. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/FailOpenAuthentication.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/FailOpenAuthentication.html new file mode 100644 index 000000000..27a82e2cf --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/FailOpenAuthentication.html @@ -0,0 +1,10 @@ +Lesson Plan Title: How to Bypass Fail Open Authentication
+Concept / Topic To Teach:
+ + This lesson presents the basics for understanding the "fail open" condition regarding authentication. The security term, “fail open” describes a behavior of a verification mechanism. This is when an error (i.e. unexpected exception) occurs during a verification method causing that method to evaluate to true. This is especially dangerous during login.General Goal(s):
+ The user should be able to bypass the authentication check. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ForcedBrowsing.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ForcedBrowsing.html new file mode 100644 index 000000000..134656b75 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ForcedBrowsing.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Exploit Forced Browsing
+Concept / Topic To Teach:
+How to Exploit Forced Browsing +General Goal(s):
+This lesson needs a creator! + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ForgotPassword.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ForgotPassword.html new file mode 100644 index 000000000..2e47124e2 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ForgotPassword.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Exploit the Forgot Password Page
+Concept / Topic To Teach:
+ +Web applications frequently provide their users the ability to retrieve a forgotten password. Unfortunately, most web applications fail to implement the mechanism properly. The information required to verify the integrity of the user is often overly simplistic. +General Goal(s):
+Users can retrieve their password if they can answer the secret question properly. There is no lock-out mechanism on this 'Forgot Password' page. Your username is 'webgoat' and your favorite color is 'red'. The goal is to retrieve the password of another user. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HiddenFieldTampering.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HiddenFieldTampering.html new file mode 100644 index 000000000..630712226 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HiddenFieldTampering.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Exploit Hidden Fields
+Concept / Topic To Teach:
+ +Developers will use hidden fields for tracking, login, pricing, etc.. information on a loaded page. While this is a convienent and easy mechanism for the developer, they often don't validate the information that is received from the hidden field. This lesson will teach the attacker to find and modify hidden fields to obtain a product for a price other than the price specifiedGeneral Goal(s):
+The user should be able to exploit a hidden field to obtain a product at an incorrect price. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HtmlClues.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HtmlClues.html new file mode 100644 index 000000000..4e1c619c9 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HtmlClues.html @@ -0,0 +1,11 @@ +Lesson Plan Title: How to Discover Clues in the HTML
+Concept / Topic To Teach:
+ + Developers are notorious for leaving statements like FIXME's, Code Broken, Hack, etc... inside the source code. Review the source code for any comments denoting passowrds, backdoors, or something doesn't work right. + +General Goal(s):
+ The user should be able to bypass the authentication check. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HttpBasics.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HttpBasics.html new file mode 100644 index 000000000..9e9bad245 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/HttpBasics.html @@ -0,0 +1,27 @@ +Lesson Plan Title: Http Basics
+Concept / Topic To Teach:
+ This lesson presents the basics for understanding the transfer of data between the browser and the web application.+How HTTP works: +
+All HTTP transactions follow the same general format. Each client request and server response has three parts: the request or response line, a header section, and the entity body. The client initiates a transaction as follows:General Goal(s):
+ +Enter your name in the input field below and press "go" to submit. The server will accept the request, reverse the input, and display it back to the user, illustrating the basics of handling an HTTP request. +Lesson Plan Title: HttpOnly Test
+Concept / Topic To Teach:
+ +To help mitigate the cross site scripting threat, Microsoft has introduced a new cookie attribute entitled 'HttpOnly.' If this flag is set, then the browser should not allow client-side script to access the cookie. Since the attribute is relatively new, several browsers neglect to handle the new attribute properly. +General Goal(s):
+The purpose of this lesson is to test whether your browser supports the HTTPOnly cookie flag. Note the value of the unique2u cookie. If your browser supports HTTPOnly, and you enable it for a cookie, client side code should NOT be able to read OR write to that cookie, but the browser can still send its value to the server. Some browsers only prevent client side read access, but don't prevent write access. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/JavaScriptValidation.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/JavaScriptValidation.html new file mode 100644 index 000000000..738575cc8 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/JavaScriptValidation.html @@ -0,0 +1,10 @@ +Lesson Plan Title: How to Bypass Client Side JavaScript Validation
+Concept / Topic To Teach:
+ +Client-side validation should not be considered a secure means of validating parameters. These validation only help reduce the amount of server processing time for normal users who do not know the format of required input. Attackers can bypass these mechanisms easily in various ways. Any client-side validation should be duplicated on the server side. This will greatly reduce the likelyhood of insecure parameter values being used in the application. + +General Goal(s):
+For this exercise, the web site requires that you follow certain rules when you fill out a form. The user should be able to break those rules, and send the website input that it wasn't expecting.Lesson Plan Title:
+Concept / Topic To Teach:
+Standards Addressed:
+General Goal(s):
+Specific Objectives:
+Required Materials:
+Anticipatory Set (Lead-In):
+Step-By-Step Procedures:
+Plan For Independent Practice:
+Closure (Reflect Anticipatory Set):
+Assessment Based On Objectives:
+Extensions (For Gifted Students):
+Possible Connections To Other Subjects:
+ \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ParameterInjection.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ParameterInjection.html new file mode 100644 index 000000000..e26ee947e --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ParameterInjection.html @@ -0,0 +1,16 @@ +Lesson Plan Title: How to Perform Parameter Injection
+Concept / Topic To Teach:
+ +Parameter injection attacks represent a serious threat to any parameter-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.General Goal(s):
+ The user should be able to execute any command on the hosting OS. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/PathBasedAccessControl.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/PathBasedAccessControl.html new file mode 100644 index 000000000..235bd2528 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/PathBasedAccessControl.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Bypass a Path Based Access Control Scheme
+Concept / Topic To Teach:
+ +In a path based access control scheme, an attacker can traverse a path by providing relative path information. Therefore an attacker can use relative paths to access files that normally are not directly accessible by anyone, or would otherwise be denied if requested directly. + +General Goal(s):
+The user should be able to access a file that is not in the listed directory. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ReflectedXSS.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ReflectedXSS.html new file mode 100644 index 000000000..745d3aa6d --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ReflectedXSS.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Perform Reflected Cross Site Scripting (XSS)
+Concept / Topic To Teach:
+ +It is always a good practice to validate all input on the server side. XSS can occur when unvalidated user input is used in an HTTP response. In a reflected XSS attack, an attacker can craft a URL with the attack script and post it to another website, email it, or otherwise get a victim to click on it. + +General Goal(s):
+For this exercise, your mission is to come up with some input containing a script. You have to try to get this page to reflect that input back to your browser, which will execute the script and do something bad. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/RemoteAdminFlaw.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/RemoteAdminFlaw.html new file mode 100644 index 000000000..207248adf --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/RemoteAdminFlaw.html @@ -0,0 +1,11 @@ +Lesson Plan Title: How to Force Browser Web Resources
+Concept / Topic To Teach:
+Applications will often have an adminstrative interface that allows privileged users access to functionality that normal users shouldn't see. The application server will often have an admin interface as well. +Standards Addressed:
+General Goal(s): + +Try to access the administrative interface for WebGoat. You may also try to access the administrative interface for Tomcat. The Tomcat admin interface can be accessed via a URL (/admin) and will not count towards the completion of this lesson. + +
\ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/RoleBasedAccessControl.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/RoleBasedAccessControl.html new file mode 100644 index 000000000..132dc235f --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/RoleBasedAccessControl.html @@ -0,0 +1,15 @@ +Lesson Plan Title: Role Based Access Control
+Concept / Topic To Teach:
+ +In role-based access control scheme, a role represents a set of access permissions and privileges. A user can be assigned one or more roles. A role-based access control normally consists of two parts: role permission management and role assignment. A broken role-based access control scheme might allow a user to perform accesses that are not allowed by his/her assigned roles, or somehow obtain unauthorized roles. + +General Goal(s):
+Your goal is to explore the access control rules that govern this site. Each role has permission to certain resources (A-F). Each user is assigned one or more roles. Only the user with the [Admin] role should have access to the 'F' resources. In a successful attack, a user doesn't have the [Admin] role can access resource F. +Lesson Resources:
+Org Chart +Lesson Plan Title: How to Create a SOAP Request
+Concept / Topic To Teach:
+ +Web Services communicate through the use of SOAP requests. These requests are submitted to a web service in an attempt to execute a function listed in the web service definition language (WSDL). Lets learn something about WSDL files. Check out WebGoats web service description language (WSDL) file. +General Goal(s):
+Try connecting to the WSDL with a browser or Web Service tool. The URL for the web service is: http://localhost/WebGoat/services/SoapRequest The WSDL can usually be viewed by adding a ?WSDL on the end of the web service request. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/SqlNumericInjection.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/SqlNumericInjection.html new file mode 100644 index 000000000..6aae8f89d --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/SqlNumericInjection.html @@ -0,0 +1,14 @@ +Lesson Plan Title: How to Perform Numeric SQL Injection
+Concept / Topic To Teach:
+ +SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack. +General Goal(s):
+The form below allows a user to view weather data. Try to inject an SQL string that results in all the weather data being displayed. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/SqlStringInjection.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/SqlStringInjection.html new file mode 100644 index 000000000..8c8f9e5b6 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/SqlStringInjection.html @@ -0,0 +1,14 @@ +Lesson Plan Title: How to Perform String SQL Injection
+Concept / Topic To Teach:
+ +SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack. +General Goal(s):
+The form below allows a user to view their credit card numbers. Try to inject an SQL string that results in all the credit card numbers being displayed. Try the user name of 'Smith'. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/StoredXss.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/StoredXss.html new file mode 100644 index 000000000..4160adcfd --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/StoredXss.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Perform Stored Cross Site Scripting (XSS)
+Concept / Topic To Teach:
+ +It is always a good practice to scrub all inputs, especially those inputs that will later be used as parameters to OS commands, scripts, and database queries. It is particularly important for content that will be permanently stored somewhere. Users should not be able to create message content that could cause another user to load an undesireable page or undesireable content when the user's message is retrieved. + +General Goal(s):
+The user should be able to add message content that cause another user to load an undesireable page or content. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ThreadSafetyProblem.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ThreadSafetyProblem.html new file mode 100644 index 000000000..1b01a915d --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/ThreadSafetyProblem.html @@ -0,0 +1,22 @@ + + + + + +Lesson Plan Title: How to Exploit Thread Safety Problems
+Concept / Topic To Teach:
+ + Web applications can handle many HTTP requests simultaneously. Developers often use variables that are not thread safe. Thread safety means that the fields of an object or class always maintain a valid state when used concurrently by multiple threads. It is often possible to exploit a concurrency bug by loading the same page as another user at the exact same time. Because all threads share the same method area, and the method area is where all class variables are stored, multiple threads can attempt to use the same class variables concurrently.General Goal(s):
+The user should be able to exploit the concurrency error in the web application and view login information for another user that is attempting the same function at the same time. This will require the use of two browsers. +Lesson Plan Title: How to Perform Cross Site Trace Attacks
+Concept / Topic To Teach:
+ +It is always a good practice to scrub all inputs, especially those inputs that will later be used as parameters to OS commands, scripts, and database queries. It is particularly important for content that will be permanently stored somewhere. Users should not be able to create message content that could cause another user to load an undesireable page or undesireable content when the user's message is retrieved. +General Goal(s):
+Tomcat is configured to support the HTTP TRACE command. Your goal is to perform a Cross Site Trace (XST) attack. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/UncheckedEmail.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/UncheckedEmail.html new file mode 100644 index 000000000..2cd2e82db --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/UncheckedEmail.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Exploit Unchecked Email
+Concept / Topic To Teach:
+ +It is always a good practice to validate all inputs. Most sites allow a non-authenticated users to send email to a 'friend'. This is a great mechanisms for spammers to send out email using your corporate mail server. + +General Goal(s):
+The user should be able to send and obnoxious email message. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WSDLScanning.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WSDLScanning.html new file mode 100644 index 000000000..df11d5a65 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WSDLScanning.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Perform WSDL Scanning
+Concept / Topic To Teach:
+ +Web Services communicate through the use of SOAP requests. These requests are submitted to a web service in an attempt to execute a function listed in the web service definition language (WSDL). +General Goal(s):
+This screen is the API for a web service. Check the WSDL for this web service and try to get some customer credit numbers. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WeakAuthenticationCookie.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WeakAuthenticationCookie.html new file mode 100644 index 000000000..1787686c4 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WeakAuthenticationCookie.html @@ -0,0 +1,10 @@ +Lesson Plan Title: How to Spoof an Authentication Cookie
+Concept / Topic To Teach:
+ +Many applications will automatically log a user into their site if the right authentication cookie is specified. Some times the cookie values can be guessed if the algorithm for generating the cookie can be obtained. Some times the cookies are left on the client machine and can be stolen by exploiting another system vulnerability. Some times the cookies maybe intercepted using Ccross site scripting. This lesson tries to make the student aware of authentication cookies and presents the student with a way to defeat the cookie authentication method in this lesson.General Goal(s):
+ The user should be able to bypass the authentication check. \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WeakSessionID.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WeakSessionID.html new file mode 100644 index 000000000..2ea769f51 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WeakSessionID.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Hijack a Session
+Concept / Topic To Teach:
+ +Application developers who develop their own session ID frequently forget to incorporate the complexity and randomness necessary for security. If the user specific session id is not complex and random, then the application is highly susceptible to session-based brute force attacks. +General Goal(s):
+Try to access an authenticated session belonging to someone else. + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WelcomeScreeen.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WelcomeScreeen.html new file mode 100644 index 000000000..be93e40e2 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WelcomeScreeen.html @@ -0,0 +1,16 @@ +Lesson Plan Title:Welcome
+Concept / Topic To Teach:
+This lesson presents the basics for understanding the transfer of data between the browser and the web application. +Standards Addressed:
+General Goal(s):
+Specific Objectives:
+Required Materials:
+Anticipatory Set (Lead-In):
+Step-By-Step Procedures:
+Plan For Independent Practice:
+Closure (Reflect Anticipatory Set):
+Assessment Based On Objectives:
+Extensions (For Gifted Students):
+Possible Connections To Other Subjects:
\ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WsSAXInjection.html b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WsSAXInjection.html new file mode 100644 index 000000000..60232826e --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_plans/WsSAXInjection.html @@ -0,0 +1,9 @@ +Lesson Plan Title: How to Perform Web Service SAX Injection
+Concept / Topic To Teach:
+ +Web Services communicate through the use of SOAP requests. These requests are submitted to a web service in an attempt to execute a function listed in the web service definition language (WSDL). +General Goal(s):
+Some web interfaces make use of Web Services in the background. If the frontend relies on the web service for all input validation, it may be possible to corrupt the XML that the web interface sends.Lesson Plan Title: How to Perform Web Service SQL Injection
+Concept / Topic To Teach:
+ +Web Services communicate through the use of SOAP requests. These requests are submitted to a web service in an attempt to execute a function listed in the web service definition language (WSDL). +General Goal(s):
+Check the web service description language (WSDL) and try to obtain multiple customer credit card numbers. You will not see the results returned to this screen. When you believe you have suceeded, refresh the page and look for the 'green star' + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lesson_template/lessons.html b/ webgoat/main/project/JavaSource/WebContent/lesson_template/lessons.html new file mode 100644 index 000000000..2ff81d53a --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lesson_template/lessons.html @@ -0,0 +1,88 @@ + + + + + + ![]() |
+
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+ Ask Dave what Penut Butter and Jelly means to VanGuard.
+
+ 00000000000000000000000.
+ 00000000000000000000000.
+ 00000000000000000000000.
+ 00000000000000000000000.
+ 00000000000000000000000.
+
+ 11111111111111111111111.
+ 11111111111111111111111.
+ 11111111111111111111111.
+ 11111111111111111111111.
+ 11111111111111111111111.
+ 11111111111111111111111.
+
+ 33333333333333333333333.
+ 33333333333333333333333.
+ 33333333333333333333333.
+ 33333333333333333333333.
+ 33333333333333333333333.
+ 33333333333333333333333.
+
+ LESSON LEARNED +
++ First Name: + | ++ <%=employee.getFirstName()%> + | ++ Last Name: + | ++ <%=employee.getLastName()%> + | +
+ Street: + | ++ + + <%=employee.getAddress1()%> + | ++ City/State: + | + <%=employee.getAddress2()%> + | +
+ Phone: + | ++ <%=employee.getPhoneNumber()%> + | ++ Start Date: + | ++ <%=employee.getStartDate()%> + | +
+ SSN: + | ++ <%=employee.getSsn()%> + | ++ Salary: + | ++ <%=employee.getSalary()%> + | +
+ Credit Card: + | ++ <%=employee.getCcn()%> + | ++ Credit Card Limit: + | ++ <%=employee.getCcnLimit()%> + | +
+ Comments: + | ++ + + <%=webSession.htmlEncode(employee.getPersonalDescription())%> + | ++ Manager: + | ++ <%=employee.getManager()%> + | +
+ Disciplinary Explanation: + | ++ <%=employee.getDisciplinaryActionNotes()%> + | ++ Disciplinary Action Dates: + | ++ <%=employee.getDisciplinaryActionDate()%> + | +
Select from the list below
+ + + \ No newline at end of file diff --git a/ webgoat/main/project/JavaSource/WebContent/lessons/RoleBasedAccessControl/Login.jsp b/ webgoat/main/project/JavaSource/WebContent/lessons/RoleBasedAccessControl/Login.jsp new file mode 100644 index 000000000..4550556de --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lessons/RoleBasedAccessControl/Login.jsp @@ -0,0 +1,37 @@ +<%@ page contentType="text/html; charset=ISO-8859-1" language="java" + import="java.util.*, org.owasp.webgoat.session.*, org.owasp.webgoat.lessons.RoleBasedAccessControl.*" + errorPage="" %> ++ First Name: + | ++ <%=employee.getFirstName()%> + | ++ Last Name: + | ++ <%=employee.getLastName()%> + | +
+ Street: + | ++ <%=employee.getAddress1()%> + | ++ City/State: + | + <%=employee.getAddress2()%> + | +
+ Phone: + | ++ <%=employee.getPhoneNumber()%> + | ++ Start Date: + | ++ <%=employee.getStartDate()%> + | +
+ SSN: + | ++ <%=employee.getSsn()%> + | ++ Salary: + | ++ <%=employee.getSalary()%> + | +
+ Credit Card: + | ++ <%=employee.getCcn()%> + | ++ Credit Card Limit: + | ++ <%=employee.getCcnLimit()%> + | +
+ Comments: + | ++ <%=employee.getPersonalDescription()%> + | +||
+ Disciplinary Explanation: + | ++ Disc. Dates: + | ++ <%=employee.getDisciplinaryActionDate()%> + | +|
+ <%=employee.getDisciplinaryActionNotes()%> + | +|||
+ Manager: + | ++ <%=employee.getManager()%> + | +
Select from the list below
+ + + diff --git a/ webgoat/main/project/JavaSource/WebContent/lessons/SQLInjection/Login.jsp b/ webgoat/main/project/JavaSource/WebContent/lessons/SQLInjection/Login.jsp new file mode 100644 index 000000000..59a2f2ae3 --- /dev/null +++ b/ webgoat/main/project/JavaSource/WebContent/lessons/SQLInjection/Login.jsp @@ -0,0 +1,37 @@ +<%@ page contentType="text/html; charset=ISO-8859-1" language="java" + import="java.util.*, org.owasp.webgoat.session.*, org.owasp.webgoat.lessons.SQLInjection.*" + errorPage="" %> ++ First Name: + | ++ <%=employee.getFirstName()%> + | ++ Last Name: + | ++ <%=employee.getLastName()%> + | +
+ Street: + | ++ <%=employee.getAddress1()%> + | ++ City/State: + | + <%=employee.getAddress2()%> + | +
+ Phone: + | ++ <%=employee.getPhoneNumber()%> + | ++ Start Date: + | ++ <%=employee.getStartDate()%> + | +
+ SSN: + | ++ <%=employee.getSsn()%> + | ++ Salary: + | ++ <%=employee.getSalary()%> + | +
+ Credit Card: + | ++ <%=employee.getCcn()%> + | ++ Credit Card Limit: + | ++ <%=employee.getCcnLimit()%> + | +
+ Comments: + | ++ <%=employee.getPersonalDescription()%> + | ++ Manager: + | ++ <%=employee.getManager()%> + | +
+ Disciplinary Explanation: + | ++ <%=employee.getDisciplinaryActionNotes()%> + | ++ Disciplinary Action Dates: + | ++ <%=employee.getDisciplinaryActionDate()%> + | +
Thank you for using WebGoat!
+This program is a demonstration of common web application flaws. + The exercises are intended to provide hands on experience with application + penetration testing techniques.
+WebGoat Design Team |
+ Lesson Contributers |
+
+ Jeff Williams
+ Bruce Mayhew
+ Laurence Casey
+ David Anderson
+ Eric Sheridan
+ Dave Wichers
+ |
+ Aspect Security + (http://www.aspectsecurity.com) |
+
Alex Smolen + (http://www.parasoft.com) |
+ |
Rogan Dawes + (http://dawes.za.net/rogan) |
+ |
Chuck Willis + (http://www.securityfoundry.com) |
+ |
Documentation Contributer |
+ |
Robert Sullivan + (http://www.unitedhealthgroup.com/) |
+
Thank you for using WebGoat!
+This program is a demonstration of common web application flaws. + The exercises are intended to provide hands on experience with application + penetration testing techniques.
+WebGoat Design Team |
+ Lesson Contributers |
+
Jeff Williams |
+ Aspect Security + (http://www.aspectsecurity.com) |
+
Bruce Mayhew |
+ Alex Smolen + (http://www.parasoft.com) |
+
Laurence Casey |
+ Rogan Dawes + (http://dawes.za.net/rogan) |
+
David Anderson |
+ Chuck Willis + (http://www.securityfoundry.com) |
+
Eric Sheridan |
+