git-svn-id: http://webgoat.googlecode.com/svn/trunk@14 4033779f-a91e-0410-96ef-6bf7bf53c507
@ -0,0 +1 @@
|
||||
Manifest-Version: 1.0
|
@ -0,0 +1,52 @@
|
||||
category.General.ranking=11
|
||||
lesson.HttpBasics.ranking=10
|
||||
lesson.ThreadSafetyProblem.ranking=20
|
||||
|
||||
category.Broken\ Authentication\ and\ Session\ Management.ranking=21
|
||||
lesson.BasicAuthentication.ranking=10
|
||||
lesson.WeakAuthenticationCookie.ranking=20
|
||||
|
||||
category.Broken\ Access\ Control.ranking=31
|
||||
lesson.AccessControlMatrix.ranking=10
|
||||
lesson.PathBasedAccessControl.ranking=20
|
||||
lesson.RoleBasedAccessControl.hidden=true
|
||||
|
||||
category.Cross-Site\ Scripting\ (XSS).ranking=41
|
||||
lesson.StoredXss.ranking=10
|
||||
lesson.ReflectedXSS.ranking=20
|
||||
lesson.CrossSiteScripting.hidden=true
|
||||
|
||||
category.Unvalidated\ Parameters.ranking=51
|
||||
lesson.HiddenFieldTampering.ranking=10
|
||||
lesson.JavaScriptValidation.ranking=20
|
||||
lesson.UncheckedEmail.ranking=30
|
||||
|
||||
category.Insecure\ Storage.ranking=61
|
||||
lesson.Encoding.ranking=10
|
||||
|
||||
category.Injection\ Flaws.ranking=71
|
||||
lesson.SqlNumericInjection.ranking=10
|
||||
lesson.SqlStringInjection.ranking=20
|
||||
lesson.CommandInjection.ranking=30
|
||||
lesson.SQLInjection.hidden=true
|
||||
|
||||
category.Improper\ Error\ Handling.ranking=81
|
||||
lesson.FailOpenAuthentication.ranking=10
|
||||
|
||||
category.Code\ Quality.ranking=91
|
||||
lesson.HtmlClues.ranking=10
|
||||
|
||||
category.Web\ Services.category.ranking=101
|
||||
lesson.SoapRequest.ranking=10
|
||||
lesson.WSDLScanning.ranking=20
|
||||
lesson.WsSqlInjection.ranking=30
|
||||
|
||||
lesson.WeakSessionID.hidden=true
|
||||
lesson.BufferOverflow.hidden=true
|
||||
lesson.BlindSqlInjection.hidden=true
|
||||
lesson.DOS_Login.hidden=true
|
||||
lesson.ForcedBrowsing.hidden=true
|
||||
lesson.ForgotPassword.hidden=true
|
||||
lesson.ParameterInjection.hidden=true
|
||||
lesson.RemoteAdminFlaw.hidden=true
|
||||
lesson.ChallengeScreen.hidden=true
|
BIN
webgoat/main/project/JavaSource/WebContent/WEB-INF/lib/axis.jar
Normal file
BIN
webgoat/main/project/JavaSource/WebContent/WEB-INF/lib/idb.jar
Normal file
BIN
webgoat/main/project/JavaSource/WebContent/WEB-INF/lib/j2h.jar
Normal file
BIN
webgoat/main/project/JavaSource/WebContent/WEB-INF/lib/saaj.jar
Normal file
@ -0,0 +1,69 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<deployment xmlns="http://xml.apache.org/axis/wsdd/" xmlns:java="http://xml.apache.org/axis/wsdd/providers/java">
|
||||
<globalConfiguration>
|
||||
<parameter name="sendMultiRefs" value="true"/>
|
||||
<parameter name="disablePrettyXML" value="true"/>
|
||||
<parameter name="adminPassword" value="admin"/>
|
||||
<!--
|
||||
<parameter name="attachments.Directory" value="C:\webgoat\tomcat\webapps\WebGoat\WEB-INF\attachments"/>
|
||||
-->
|
||||
<parameter name="dotNetSoapEncFix" value="true"/>
|
||||
<parameter name="enableNamespacePrefixOptimization" value="true"/>
|
||||
<parameter name="sendXMLDeclaration" value="true"/>
|
||||
<!--
|
||||
<parameter name="attachments.implementation" value="org.apache.axis.attachments.AttachmentsImpl"/>
|
||||
-->
|
||||
<parameter name="sendXsiTypes" value="true"/>
|
||||
<requestFlow>
|
||||
<handler type="java:org.apache.axis.handlers.JWSHandler">
|
||||
<parameter name="scope" value="session"/>
|
||||
</handler>
|
||||
<handler type="java:org.apache.axis.handlers.JWSHandler">
|
||||
<parameter name="scope" value="request"/>
|
||||
<parameter name="extension" value=".jwr"/>
|
||||
</handler>
|
||||
</requestFlow>
|
||||
</globalConfiguration>
|
||||
<handler name="LocalResponder" type="java:org.apache.axis.transport.local.LocalResponder"/>
|
||||
<handler name="URLMapper" type="java:org.apache.axis.handlers.http.URLMapper"/>
|
||||
<handler name="Authenticate" type="java:org.apache.axis.handlers.SimpleAuthenticationHandler"/>
|
||||
<service name="WSDLScanning" provider="java:RPC">
|
||||
<parameter name="allowedMethods" value="getFirstName, getLastName, getCreditCard, getLoginCount"/>
|
||||
<parameter name="className" value="org.owasp.webgoat.lessons.WSDLScanning"/>
|
||||
</service>
|
||||
<service name="SoapRequest" provider="java:RPC">
|
||||
<parameter name="allowedMethods" value="getFirstName, getLastName, getCreditCard, getLoginCount"/>
|
||||
<parameter name="className" value="org.owasp.webgoat.lessons.SoapRequest"/>
|
||||
</service>
|
||||
<service name="AdminService" provider="java:MSG">
|
||||
<parameter name="allowedMethods" value="AdminService"/>
|
||||
<parameter name="enableRemoteAdmin" value="false"/>
|
||||
<parameter name="className" value="org.apache.axis.utils.Admin"/>
|
||||
<namespace>http://xml.apache.org/axis/wsdd/</namespace>
|
||||
</service>
|
||||
<service name="Version" provider="java:RPC">
|
||||
<parameter name="allowedMethods" value="getVersion"/>
|
||||
<parameter name="className" value="org.apache.axis.Version"/>
|
||||
</service>
|
||||
<service name="WsSqlInjection" provider="java:RPC">
|
||||
<parameter name="allowedMethods" value="getCreditCard"/>
|
||||
<parameter name="className" value="org.owasp.webgoat.lessons.WsSqlInjection"/>
|
||||
</service>
|
||||
<transport name="http">
|
||||
<requestFlow>
|
||||
<handler type="URLMapper"/>
|
||||
<handler type="java:org.apache.axis.handlers.http.HTTPAuthHandler"/>
|
||||
</requestFlow>
|
||||
<parameter name="qs:list" value="org.apache.axis.transport.http.QSListHandler"/>
|
||||
<parameter name="qs:wsdl" value="org.apache.axis.transport.http.QSWSDLHandler"/>
|
||||
<parameter name="qs.list" value="org.apache.axis.transport.http.QSListHandler"/>
|
||||
<parameter name="qs.method" value="org.apache.axis.transport.http.QSMethodHandler"/>
|
||||
<parameter name="qs:method" value="org.apache.axis.transport.http.QSMethodHandler"/>
|
||||
<parameter name="qs.wsdl" value="org.apache.axis.transport.http.QSWSDLHandler"/>
|
||||
</transport>
|
||||
<transport name="local">
|
||||
<responseFlow>
|
||||
<handler type="LocalResponder"/>
|
||||
</responseFlow>
|
||||
</transport>
|
||||
</deployment>
|
318
webgoat/main/project/JavaSource/WebContent/WEB-INF/web-unix.xml
Normal file
@ -0,0 +1,318 @@
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?>
|
||||
<!DOCTYPE web-app
|
||||
PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
|
||||
"http://java.sun.com/dtd/web-app_2_3.dtd">
|
||||
|
||||
<web-app>
|
||||
|
||||
<!-- General description of your web application -->
|
||||
<display-name>WebGoat</display-name>
|
||||
<description>
|
||||
This web application is designed to demonstrate web
|
||||
application security flaws for the purpose of educating
|
||||
developers and security professionals about web
|
||||
application security problems. The initial version was
|
||||
written by Aspect Security (info@aspectsecurity.com),
|
||||
and was donated to the OWASP.
|
||||
</description>
|
||||
|
||||
|
||||
|
||||
<!-- Context initialization parameters that define shared
|
||||
String constants used within your application, which
|
||||
can be customized by the system administrator who is
|
||||
installing your application. The values actually
|
||||
assigned to these parameters can be retrieved in a
|
||||
servlet or JSP page by calling:
|
||||
|
||||
String value =
|
||||
getServletContext().getInitParameter("name");
|
||||
|
||||
where "name" matches the <param-name> element of
|
||||
one of these initialization parameters.
|
||||
|
||||
You can define any number of context initialization
|
||||
parameters, including zero.
|
||||
-->
|
||||
|
||||
<context-param>
|
||||
<param-name>email</param-name>
|
||||
<param-value>info@aspectsecurity.com</param-value>
|
||||
<description>
|
||||
The EMAIL address of the administrator to whom questions
|
||||
and comments about this application should be addressed.
|
||||
</description>
|
||||
</context-param>
|
||||
|
||||
<!-- Servlet definitions for the servlets that make up
|
||||
your web application, including initialization
|
||||
parameters. With Tomcat, you can also send requests
|
||||
to servlets not listed here with a request like this:
|
||||
|
||||
http://localhost:8080/{context-path}/servlet/{classname}
|
||||
|
||||
but this usage is not guaranteed to be portable. It also
|
||||
makes relative references to images and other resources
|
||||
required by your servlet more complicated, so defining
|
||||
all of your servlets (and defining a mapping to them with
|
||||
a servlet-mapping element) is recommended.
|
||||
|
||||
Servlet initialization parameters can be retrieved in a
|
||||
servlet or JSP page by calling:
|
||||
|
||||
String value =
|
||||
getServletConfig().getInitParameter("name");
|
||||
|
||||
where "name" matches the <param-name> element of
|
||||
one of these initialization parameters.
|
||||
|
||||
You can define any number of servlets, including zero.
|
||||
-->
|
||||
|
||||
<servlet>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<display-name>Apache-Axis Servlet</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.transport.http.AxisServlet
|
||||
</servlet-class>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>AdminServlet</servlet-name>
|
||||
<display-name>Axis Admin Servlet</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.transport.http.AdminServlet
|
||||
</servlet-class>
|
||||
<load-on-startup>100</load-on-startup>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>SOAPMonitorService</servlet-name>
|
||||
<display-name>SOAPMonitorService</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.monitor.SOAPMonitorService
|
||||
</servlet-class>
|
||||
<init-param>
|
||||
<param-name>SOAPMonitorPort</param-name>
|
||||
<param-value>5001</param-value>
|
||||
</init-param>
|
||||
<load-on-startup>100</load-on-startup>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>WebGoat</servlet-name>
|
||||
<description>
|
||||
This servlet plays the "controller" role in the MVC architecture
|
||||
used in this application.
|
||||
|
||||
The initialization parameter namess for this servlet are the
|
||||
"servlet path" that will be received by this servlet (after the
|
||||
filename extension is removed). The corresponding value is the
|
||||
name of the action class that will be used to process this request.
|
||||
</description>
|
||||
<servlet-class>org.owasp.webgoat.HammerHead</servlet-class>
|
||||
|
||||
<init-param>
|
||||
<param-name>debug</param-name>
|
||||
<param-value>false</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>CookieDebug</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DefuseOSCommands</param-name>
|
||||
<param-value>false</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>Enterprise</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<!-- Specify an address where you would like comments to be sent. -->
|
||||
<!-- This can be any URL or HTML tags, and will appear on the report card and lesson incomplete pages -->
|
||||
<!-- Use iso8859-1 encoding to represent special characters that might confuse XML parser. For
|
||||
example, replace "<" with "<" and ">" with ">". -->
|
||||
<param-name>FeedbackAddress</param-name>
|
||||
<param-value>
|
||||
<A HREF=mailto:webgoat@aspectsecurity.com>webgoat@aspectsecurity.com</A>
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DatabaseDriver</param-name>
|
||||
<param-value>
|
||||
<!--sun.jdbc.odbc.JdbcOdbcDriver-->
|
||||
org.enhydra.instantdb.jdbc.idbDriver
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DatabaseConnectionString</param-name>
|
||||
<param-value>
|
||||
<!-- insert the word PATH where you want to insert the realpath to the base of the web context-->
|
||||
jdbc:idb:PATH/database.prp
|
||||
<!--jdbc:odbc:;DRIVER=Enhydra InstantDB Driver (*.prp);DBQ=PATH/webgoat.mdb;PWD=webgoat"-->
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<!-- Load this servlet at server startup time -->
|
||||
|
||||
<load-on-startup>5</load-on-startup>
|
||||
|
||||
</servlet>
|
||||
|
||||
|
||||
<servlet>
|
||||
<servlet-name>LessonSource</servlet-name>
|
||||
<description>
|
||||
This servlet returns the Java source of the current lesson.
|
||||
</description>
|
||||
<servlet-class>org.owasp.webgoat.LessonSource</servlet-class>
|
||||
</servlet>
|
||||
|
||||
<!-- Define mappings that are used by the servlet container to
|
||||
translate a particular request URI (context-relative) to a
|
||||
particular servlet. The examples below correspond to the
|
||||
servlet descriptions above. Thus, a request URI like:
|
||||
|
||||
http://localhost:8080/{contextpath}/graph
|
||||
|
||||
will be mapped to the "graph" servlet, while a request like:
|
||||
|
||||
http://localhost:8080/{contextpath}/saveCustomer.do
|
||||
|
||||
will be mapped to the "controller" servlet.
|
||||
|
||||
You may define any number of servlet mappings, including zero.
|
||||
It is also legal to define more than one mapping for the same
|
||||
servlet, if you wish to.
|
||||
-->
|
||||
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>/servlet/AxisServlet</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>*.jws</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>/services/*</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>SOAPMonitorService</servlet-name>
|
||||
<url-pattern>/SOAPMonitor</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<!-- uncomment this if you want the admin servlet -->
|
||||
<!--
|
||||
<servlet-mapping>
|
||||
<servlet-name>AdminServlet</servlet-name>
|
||||
<url-pattern>/servlet/AdminServlet</url-pattern>
|
||||
</servlet-mapping>
|
||||
-->
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>WebGoat</servlet-name>
|
||||
<url-pattern>/attack</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>LessonSource</servlet-name>
|
||||
<url-pattern>/source</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
|
||||
<!-- Define the default session timeout for your application,
|
||||
in minutes. From a servlet or JSP page, you can modify
|
||||
the timeout for a particular session dynamically by using
|
||||
HttpSession.getMaxInactiveInterval(). -->
|
||||
|
||||
<session-config>
|
||||
<!-- 2 days -->
|
||||
<session-timeout>2880</session-timeout>
|
||||
</session-config>
|
||||
|
||||
<mime-mapping>
|
||||
<extension>wmv</extension>
|
||||
<mime-type>video/x-ms-wmv</mime-type>
|
||||
</mime-mapping>
|
||||
|
||||
<!-- Define reference to the user database for looking up roles -->
|
||||
<resource-env-ref>
|
||||
<description>
|
||||
Link to the UserDatabase instance from which we request lists of
|
||||
defined role names. Typically, this will be connected to the global
|
||||
user database with a ResourceLink element in server.xml or the context
|
||||
configuration file for the Manager web application.
|
||||
</description>
|
||||
<resource-env-ref-name>users</resource-env-ref-name>
|
||||
<resource-env-ref-type>
|
||||
org.apache.catalina.UserDatabase
|
||||
</resource-env-ref-type>
|
||||
</resource-env-ref>
|
||||
|
||||
|
||||
<!-- Define a Security Constraint on this Application -->
|
||||
<security-constraint>
|
||||
<web-resource-collection>
|
||||
<web-resource-name>WebGoat Application</web-resource-name>
|
||||
<url-pattern>/*</url-pattern>
|
||||
</web-resource-collection>
|
||||
<auth-constraint>
|
||||
<role-name>webgoat_user</role-name>
|
||||
<role-name>webgoat_admin</role-name>
|
||||
<role-name>webgoat_challenge</role-name>
|
||||
</auth-constraint>
|
||||
</security-constraint>
|
||||
|
||||
<security-constraint>
|
||||
<web-resource-collection>
|
||||
<web-resource-name>WebGoat Application Source</web-resource-name>
|
||||
<url-pattern>/JavaSource/*</url-pattern>
|
||||
</web-resource-collection>
|
||||
<auth-constraint>
|
||||
<role-name>server_admin</role-name>
|
||||
</auth-constraint>
|
||||
</security-constraint>
|
||||
|
||||
|
||||
<!-- Login configuration uses BASIC authentication -->
|
||||
<login-config>
|
||||
<auth-method>BASIC</auth-method>
|
||||
<realm-name>WebGoat Application</realm-name>
|
||||
</login-config>
|
||||
|
||||
<!-- Security roles referenced by this web application -->
|
||||
<security-role>
|
||||
<description>The role that is required to administrate WebGoat</description>
|
||||
<role-name>webgoat_admin</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>The role that is required to start the challenge log viewer</description>
|
||||
<role-name>webgoat_challenge</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>The role that is required to use WebGoat</description>
|
||||
<role-name>webgoat_user</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>This role is for admins only</description>
|
||||
<role-name>server_admin</role-name>
|
||||
</security-role>
|
||||
|
||||
</web-app>
|
||||
|
@ -0,0 +1,318 @@
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?>
|
||||
<!DOCTYPE web-app
|
||||
PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
|
||||
"http://java.sun.com/dtd/web-app_2_3.dtd">
|
||||
|
||||
<web-app>
|
||||
|
||||
<!-- General description of your web application -->
|
||||
<display-name>WebGoat</display-name>
|
||||
<description>
|
||||
This web application is designed to demonstrate web
|
||||
application security flaws for the purpose of educating
|
||||
developers and security professionals about web
|
||||
application security problems. The initial version was
|
||||
written by Aspect Security (info@aspectsecurity.com),
|
||||
and was donated to the OWASP.
|
||||
</description>
|
||||
|
||||
|
||||
|
||||
<!-- Context initialization parameters that define shared
|
||||
String constants used within your application, which
|
||||
can be customized by the system administrator who is
|
||||
installing your application. The values actually
|
||||
assigned to these parameters can be retrieved in a
|
||||
servlet or JSP page by calling:
|
||||
|
||||
String value =
|
||||
getServletContext().getInitParameter("name");
|
||||
|
||||
where "name" matches the <param-name> element of
|
||||
one of these initialization parameters.
|
||||
|
||||
You can define any number of context initialization
|
||||
parameters, including zero.
|
||||
-->
|
||||
|
||||
<context-param>
|
||||
<param-name>email</param-name>
|
||||
<param-value>info@aspectsecurity.com</param-value>
|
||||
<description>
|
||||
The EMAIL address of the administrator to whom questions
|
||||
and comments about this application should be addressed.
|
||||
</description>
|
||||
</context-param>
|
||||
|
||||
<!-- Servlet definitions for the servlets that make up
|
||||
your web application, including initialization
|
||||
parameters. With Tomcat, you can also send requests
|
||||
to servlets not listed here with a request like this:
|
||||
|
||||
http://localhost:8080/{context-path}/servlet/{classname}
|
||||
|
||||
but this usage is not guaranteed to be portable. It also
|
||||
makes relative references to images and other resources
|
||||
required by your servlet more complicated, so defining
|
||||
all of your servlets (and defining a mapping to them with
|
||||
a servlet-mapping element) is recommended.
|
||||
|
||||
Servlet initialization parameters can be retrieved in a
|
||||
servlet or JSP page by calling:
|
||||
|
||||
String value =
|
||||
getServletConfig().getInitParameter("name");
|
||||
|
||||
where "name" matches the <param-name> element of
|
||||
one of these initialization parameters.
|
||||
|
||||
You can define any number of servlets, including zero.
|
||||
-->
|
||||
|
||||
<servlet>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<display-name>Apache-Axis Servlet</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.transport.http.AxisServlet
|
||||
</servlet-class>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>AdminServlet</servlet-name>
|
||||
<display-name>Axis Admin Servlet</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.transport.http.AdminServlet
|
||||
</servlet-class>
|
||||
<load-on-startup>100</load-on-startup>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>SOAPMonitorService</servlet-name>
|
||||
<display-name>SOAPMonitorService</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.monitor.SOAPMonitorService
|
||||
</servlet-class>
|
||||
<init-param>
|
||||
<param-name>SOAPMonitorPort</param-name>
|
||||
<param-value>5001</param-value>
|
||||
</init-param>
|
||||
<load-on-startup>100</load-on-startup>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>WebGoat</servlet-name>
|
||||
<description>
|
||||
This servlet plays the "controller" role in the MVC architecture
|
||||
used in this application.
|
||||
|
||||
The initialization parameter namess for this servlet are the
|
||||
"servlet path" that will be received by this servlet (after the
|
||||
filename extension is removed). The corresponding value is the
|
||||
name of the action class that will be used to process this request.
|
||||
</description>
|
||||
<servlet-class>org.owasp.webgoat.HammerHead</servlet-class>
|
||||
|
||||
<init-param>
|
||||
<param-name>debug</param-name>
|
||||
<param-value>false</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>CookieDebug</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DefuseOSCommands</param-name>
|
||||
<param-value>false</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>Enterprise</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<!-- Specify an address where you would like comments to be sent. -->
|
||||
<!-- This can be any URL or HTML tags, and will appear on the report card and lesson incomplete pages -->
|
||||
<!-- Use iso8859-1 encoding to represent special characters that might confuse XML parser. For
|
||||
example, replace "<" with "<" and ">" with ">". -->
|
||||
<param-name>FeedbackAddress</param-name>
|
||||
<param-value>
|
||||
<A HREF=mailto:webgoat@aspectsecurity.com>webgoat@aspectsecurity.com</A>
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DatabaseDriver</param-name>
|
||||
<param-value>
|
||||
sun.jdbc.odbc.JdbcOdbcDriver
|
||||
<!--org.enhydra.instantdb.jdbc.idbDriver-->
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DatabaseConnectionString</param-name>
|
||||
<param-value>
|
||||
<!-- insert the word PATH where you want to insert the realpath to the base of the web context-->
|
||||
<!--jdbc:idb:PATH/database.prp-->
|
||||
jdbc:odbc:;DRIVER=Microsoft Access Driver (*.mdb);DBQ=PATH/webgoat.mdb;PWD=webgoat"
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<!-- Load this servlet at server startup time -->
|
||||
|
||||
<load-on-startup>5</load-on-startup>
|
||||
|
||||
</servlet>
|
||||
|
||||
|
||||
<servlet>
|
||||
<servlet-name>LessonSource</servlet-name>
|
||||
<description>
|
||||
This servlet returns the Java source of the current lesson.
|
||||
</description>
|
||||
<servlet-class>org.owasp.webgoat.LessonSource</servlet-class>
|
||||
</servlet>
|
||||
|
||||
<!-- Define mappings that are used by the servlet container to
|
||||
translate a particular request URI (context-relative) to a
|
||||
particular servlet. The examples below correspond to the
|
||||
servlet descriptions above. Thus, a request URI like:
|
||||
|
||||
http://localhost:8080/{contextpath}/graph
|
||||
|
||||
will be mapped to the "graph" servlet, while a request like:
|
||||
|
||||
http://localhost:8080/{contextpath}/saveCustomer.do
|
||||
|
||||
will be mapped to the "controller" servlet.
|
||||
|
||||
You may define any number of servlet mappings, including zero.
|
||||
It is also legal to define more than one mapping for the same
|
||||
servlet, if you wish to.
|
||||
-->
|
||||
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>/servlet/AxisServlet</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>*.jws</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>/services/*</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>SOAPMonitorService</servlet-name>
|
||||
<url-pattern>/SOAPMonitor</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<!-- uncomment this if you want the admin servlet -->
|
||||
<!--
|
||||
<servlet-mapping>
|
||||
<servlet-name>AdminServlet</servlet-name>
|
||||
<url-pattern>/servlet/AdminServlet</url-pattern>
|
||||
</servlet-mapping>
|
||||
-->
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>WebGoat</servlet-name>
|
||||
<url-pattern>/attack</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>LessonSource</servlet-name>
|
||||
<url-pattern>/source</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
|
||||
<!-- Define the default session timeout for your application,
|
||||
in minutes. From a servlet or JSP page, you can modify
|
||||
the timeout for a particular session dynamically by using
|
||||
HttpSession.getMaxInactiveInterval(). -->
|
||||
|
||||
<session-config>
|
||||
<!-- 2 days -->
|
||||
<session-timeout>2880</session-timeout>
|
||||
</session-config>
|
||||
|
||||
<mime-mapping>
|
||||
<extension>wmv</extension>
|
||||
<mime-type>video/x-ms-wmv</mime-type>
|
||||
</mime-mapping>
|
||||
|
||||
<!-- Define reference to the user database for looking up roles -->
|
||||
<resource-env-ref>
|
||||
<description>
|
||||
Link to the UserDatabase instance from which we request lists of
|
||||
defined role names. Typically, this will be connected to the global
|
||||
user database with a ResourceLink element in server.xml or the context
|
||||
configuration file for the Manager web application.
|
||||
</description>
|
||||
<resource-env-ref-name>users</resource-env-ref-name>
|
||||
<resource-env-ref-type>
|
||||
org.apache.catalina.UserDatabase
|
||||
</resource-env-ref-type>
|
||||
</resource-env-ref>
|
||||
|
||||
|
||||
<!-- Define a Security Constraint on this Application -->
|
||||
<security-constraint>
|
||||
<web-resource-collection>
|
||||
<web-resource-name>WebGoat Application</web-resource-name>
|
||||
<url-pattern>/*</url-pattern>
|
||||
</web-resource-collection>
|
||||
<auth-constraint>
|
||||
<role-name>webgoat_user</role-name>
|
||||
<role-name>webgoat_admin</role-name>
|
||||
<role-name>webgoat_challenge</role-name>
|
||||
</auth-constraint>
|
||||
</security-constraint>
|
||||
|
||||
<security-constraint>
|
||||
<web-resource-collection>
|
||||
<web-resource-name>WebGoat Application Source</web-resource-name>
|
||||
<url-pattern>/JavaSource/*</url-pattern>
|
||||
</web-resource-collection>
|
||||
<auth-constraint>
|
||||
<role-name>server_admin</role-name>
|
||||
</auth-constraint>
|
||||
</security-constraint>
|
||||
|
||||
|
||||
<!-- Login configuration uses BASIC authentication -->
|
||||
<login-config>
|
||||
<auth-method>BASIC</auth-method>
|
||||
<realm-name>WebGoat Application</realm-name>
|
||||
</login-config>
|
||||
|
||||
<!-- Security roles referenced by this web application -->
|
||||
<security-role>
|
||||
<description>The role that is required to administrate WebGoat</description>
|
||||
<role-name>webgoat_admin</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>The role that is required to start the challenge log viewer</description>
|
||||
<role-name>webgoat_challenge</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>The role that is required to use WebGoat</description>
|
||||
<role-name>webgoat_user</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>This role is for admins only</description>
|
||||
<role-name>server_admin</role-name>
|
||||
</security-role>
|
||||
|
||||
</web-app>
|
||||
|
318
webgoat/main/project/JavaSource/WebContent/WEB-INF/web.xml
Normal file
@ -0,0 +1,318 @@
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?>
|
||||
<!DOCTYPE web-app
|
||||
PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
|
||||
"http://java.sun.com/dtd/web-app_2_3.dtd">
|
||||
|
||||
<web-app>
|
||||
|
||||
<!-- General description of your web application -->
|
||||
<display-name>WebGoat</display-name>
|
||||
<description>
|
||||
This web application is designed to demonstrate web
|
||||
application security flaws for the purpose of educating
|
||||
developers and security professionals about web
|
||||
application security problems. The initial version was
|
||||
written by Aspect Security (info@aspectsecurity.com),
|
||||
and was donated to the OWASP.
|
||||
</description>
|
||||
|
||||
|
||||
|
||||
<!-- Context initialization parameters that define shared
|
||||
String constants used within your application, which
|
||||
can be customized by the system administrator who is
|
||||
installing your application. The values actually
|
||||
assigned to these parameters can be retrieved in a
|
||||
servlet or JSP page by calling:
|
||||
|
||||
String value =
|
||||
getServletContext().getInitParameter("name");
|
||||
|
||||
where "name" matches the <param-name> element of
|
||||
one of these initialization parameters.
|
||||
|
||||
You can define any number of context initialization
|
||||
parameters, including zero.
|
||||
-->
|
||||
|
||||
<context-param>
|
||||
<param-name>email</param-name>
|
||||
<param-value>info@aspectsecurity.com</param-value>
|
||||
<description>
|
||||
The EMAIL address of the administrator to whom questions
|
||||
and comments about this application should be addressed.
|
||||
</description>
|
||||
</context-param>
|
||||
|
||||
<!-- Servlet definitions for the servlets that make up
|
||||
your web application, including initialization
|
||||
parameters. With Tomcat, you can also send requests
|
||||
to servlets not listed here with a request like this:
|
||||
|
||||
http://localhost:8080/{context-path}/servlet/{classname}
|
||||
|
||||
but this usage is not guaranteed to be portable. It also
|
||||
makes relative references to images and other resources
|
||||
required by your servlet more complicated, so defining
|
||||
all of your servlets (and defining a mapping to them with
|
||||
a servlet-mapping element) is recommended.
|
||||
|
||||
Servlet initialization parameters can be retrieved in a
|
||||
servlet or JSP page by calling:
|
||||
|
||||
String value =
|
||||
getServletConfig().getInitParameter("name");
|
||||
|
||||
where "name" matches the <param-name> element of
|
||||
one of these initialization parameters.
|
||||
|
||||
You can define any number of servlets, including zero.
|
||||
-->
|
||||
|
||||
<servlet>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<display-name>Apache-Axis Servlet</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.transport.http.AxisServlet
|
||||
</servlet-class>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>AdminServlet</servlet-name>
|
||||
<display-name>Axis Admin Servlet</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.transport.http.AdminServlet
|
||||
</servlet-class>
|
||||
<load-on-startup>100</load-on-startup>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>SOAPMonitorService</servlet-name>
|
||||
<display-name>SOAPMonitorService</display-name>
|
||||
<servlet-class>
|
||||
org.apache.axis.monitor.SOAPMonitorService
|
||||
</servlet-class>
|
||||
<init-param>
|
||||
<param-name>SOAPMonitorPort</param-name>
|
||||
<param-value>5001</param-value>
|
||||
</init-param>
|
||||
<load-on-startup>100</load-on-startup>
|
||||
</servlet>
|
||||
|
||||
<servlet>
|
||||
<servlet-name>WebGoat</servlet-name>
|
||||
<description>
|
||||
This servlet plays the "controller" role in the MVC architecture
|
||||
used in this application.
|
||||
|
||||
The initialization parameter namess for this servlet are the
|
||||
"servlet path" that will be received by this servlet (after the
|
||||
filename extension is removed). The corresponding value is the
|
||||
name of the action class that will be used to process this request.
|
||||
</description>
|
||||
<servlet-class>org.owasp.webgoat.HammerHead</servlet-class>
|
||||
|
||||
<init-param>
|
||||
<param-name>debug</param-name>
|
||||
<param-value>false</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>CookieDebug</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DefuseOSCommands</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>Enterprise</param-name>
|
||||
<param-value>true</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<!-- Specify an address where you would like comments to be sent. -->
|
||||
<!-- This can be any URL or HTML tags, and will appear on the report card and lesson incomplete pages -->
|
||||
<!-- Use iso8859-1 encoding to represent special characters that might confuse XML parser. For
|
||||
example, replace "<" with "<" and ">" with ">". -->
|
||||
<param-name>FeedbackAddress</param-name>
|
||||
<param-value>
|
||||
<A HREF=mailto:webgoat@aspectsecurity.com>webgoat@aspectsecurity.com</A>
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DatabaseDriver</param-name>
|
||||
<param-value>
|
||||
sun.jdbc.odbc.JdbcOdbcDriver
|
||||
<!--org.enhydra.instantdb.jdbc.idbDriver-->
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<init-param>
|
||||
<param-name>DatabaseConnectionString</param-name>
|
||||
<param-value>
|
||||
<!-- insert the word PATH where you want to insert the realpath to the base of the web context-->
|
||||
<!--jdbc:idb:PATH/database.prp-->
|
||||
jdbc:odbc:;DRIVER=Microsoft Access Driver (*.mdb);DBQ=PATH/webgoat.mdb;PWD=webgoat"
|
||||
</param-value>
|
||||
</init-param>
|
||||
|
||||
<!-- Load this servlet at server startup time -->
|
||||
|
||||
<load-on-startup>5</load-on-startup>
|
||||
|
||||
</servlet>
|
||||
|
||||
|
||||
<servlet>
|
||||
<servlet-name>LessonSource</servlet-name>
|
||||
<description>
|
||||
This servlet returns the Java source of the current lesson.
|
||||
</description>
|
||||
<servlet-class>org.owasp.webgoat.LessonSource</servlet-class>
|
||||
</servlet>
|
||||
|
||||
<!-- Define mappings that are used by the servlet container to
|
||||
translate a particular request URI (context-relative) to a
|
||||
particular servlet. The examples below correspond to the
|
||||
servlet descriptions above. Thus, a request URI like:
|
||||
|
||||
http://localhost:8080/{contextpath}/graph
|
||||
|
||||
will be mapped to the "graph" servlet, while a request like:
|
||||
|
||||
http://localhost:8080/{contextpath}/saveCustomer.do
|
||||
|
||||
will be mapped to the "controller" servlet.
|
||||
|
||||
You may define any number of servlet mappings, including zero.
|
||||
It is also legal to define more than one mapping for the same
|
||||
servlet, if you wish to.
|
||||
-->
|
||||
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>/servlet/AxisServlet</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>*.jws</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>AxisServlet</servlet-name>
|
||||
<url-pattern>/services/*</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>SOAPMonitorService</servlet-name>
|
||||
<url-pattern>/SOAPMonitor</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<!-- uncomment this if you want the admin servlet -->
|
||||
<!--
|
||||
<servlet-mapping>
|
||||
<servlet-name>AdminServlet</servlet-name>
|
||||
<url-pattern>/servlet/AdminServlet</url-pattern>
|
||||
</servlet-mapping>
|
||||
-->
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>WebGoat</servlet-name>
|
||||
<url-pattern>/attack</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
<servlet-mapping>
|
||||
<servlet-name>LessonSource</servlet-name>
|
||||
<url-pattern>/source</url-pattern>
|
||||
</servlet-mapping>
|
||||
|
||||
|
||||
<!-- Define the default session timeout for your application,
|
||||
in minutes. From a servlet or JSP page, you can modify
|
||||
the timeout for a particular session dynamically by using
|
||||
HttpSession.getMaxInactiveInterval(). -->
|
||||
|
||||
<session-config>
|
||||
<!-- 2 days -->
|
||||
<session-timeout>2880</session-timeout>
|
||||
</session-config>
|
||||
|
||||
<mime-mapping>
|
||||
<extension>wmv</extension>
|
||||
<mime-type>video/x-ms-wmv</mime-type>
|
||||
</mime-mapping>
|
||||
|
||||
<!-- Define reference to the user database for looking up roles -->
|
||||
<resource-env-ref>
|
||||
<description>
|
||||
Link to the UserDatabase instance from which we request lists of
|
||||
defined role names. Typically, this will be connected to the global
|
||||
user database with a ResourceLink element in server.xml or the context
|
||||
configuration file for the Manager web application.
|
||||
</description>
|
||||
<resource-env-ref-name>users</resource-env-ref-name>
|
||||
<resource-env-ref-type>
|
||||
org.apache.catalina.UserDatabase
|
||||
</resource-env-ref-type>
|
||||
</resource-env-ref>
|
||||
|
||||
|
||||
<!-- Define a Security Constraint on this Application -->
|
||||
<security-constraint>
|
||||
<web-resource-collection>
|
||||
<web-resource-name>WebGoat Application</web-resource-name>
|
||||
<url-pattern>/*</url-pattern>
|
||||
</web-resource-collection>
|
||||
<auth-constraint>
|
||||
<role-name>webgoat_user</role-name>
|
||||
<role-name>webgoat_admin</role-name>
|
||||
<role-name>webgoat_challenge</role-name>
|
||||
</auth-constraint>
|
||||
</security-constraint>
|
||||
|
||||
<security-constraint>
|
||||
<web-resource-collection>
|
||||
<web-resource-name>WebGoat Application Source</web-resource-name>
|
||||
<url-pattern>/JavaSource/*</url-pattern>
|
||||
</web-resource-collection>
|
||||
<auth-constraint>
|
||||
<role-name>server_admin</role-name>
|
||||
</auth-constraint>
|
||||
</security-constraint>
|
||||
|
||||
|
||||
<!-- Login configuration uses BASIC authentication -->
|
||||
<login-config>
|
||||
<auth-method>BASIC</auth-method>
|
||||
<realm-name>WebGoat Application</realm-name>
|
||||
</login-config>
|
||||
|
||||
<!-- Security roles referenced by this web application -->
|
||||
<security-role>
|
||||
<description>The role that is required to administrate WebGoat</description>
|
||||
<role-name>webgoat_admin</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>The role that is required to start the challenge log viewer</description>
|
||||
<role-name>webgoat_challenge</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>The role that is required to use WebGoat</description>
|
||||
<role-name>webgoat_user</role-name>
|
||||
</security-role>
|
||||
|
||||
<security-role>
|
||||
<description>This role is for admins only</description>
|
||||
<role-name>server_admin</role-name>
|
||||
</security-role>
|
||||
|
||||
</web-app>
|
||||
|
@ -0,0 +1,52 @@
|
||||
category.General.ranking=11
|
||||
lesson.HttpBasics.ranking=10
|
||||
lesson.ThreadSafetyProblem.ranking=20
|
||||
|
||||
category.Broken\ Authentication\ and\ Session\ Management.ranking=21
|
||||
lesson.BasicAuthentication.ranking=10
|
||||
lesson.WeakAuthenticationCookie.ranking=20
|
||||
|
||||
category.Broken\ Access\ Control.ranking=31
|
||||
lesson.AccessControlMatrix.ranking=10
|
||||
lesson.PathBasedAccessControl.ranking=20
|
||||
lesson.RoleBasedAccessControl.hidden=true
|
||||
|
||||
category.Cross-Site\ Scripting\ (XSS).ranking=41
|
||||
lesson.StoredXss.ranking=10
|
||||
lesson.ReflectedXSS.ranking=20
|
||||
lesson.CrossSiteScripting.hidden=true
|
||||
|
||||
category.Unvalidated\ Parameters.ranking=51
|
||||
lesson.HiddenFieldTampering.ranking=10
|
||||
lesson.JavaScriptValidation.ranking=20
|
||||
lesson.UncheckedEmail.ranking=30
|
||||
|
||||
category.Insecure\ Storage.ranking=61
|
||||
lesson.Encoding.ranking=10
|
||||
|
||||
category.Injection\ Flaws.ranking=71
|
||||
lesson.SqlNumericInjection.ranking=10
|
||||
lesson.SqlStringInjection.ranking=20
|
||||
lesson.CommandInjection.ranking=30
|
||||
lesson.SQLInjection.hidden=true
|
||||
|
||||
category.Improper\ Error\ Handling.ranking=81
|
||||
lesson.FailOpenAuthentication.ranking=10
|
||||
|
||||
category.Code\ Quality.ranking=91
|
||||
lesson.HtmlClues.ranking=10
|
||||
|
||||
category.Web\ Services.category.ranking=101
|
||||
lesson.SoapRequest.ranking=10
|
||||
lesson.WSDLScanning.ranking=20
|
||||
lesson.WsSqlInjection.ranking=30
|
||||
|
||||
lesson.WeakSessionID.hidden=true
|
||||
lesson.BufferOverflow.hidden=true
|
||||
lesson.BlindSqlInjection.hidden=true
|
||||
lesson.DOS_Login.hidden=true
|
||||
lesson.ForcedBrowsing.hidden=true
|
||||
lesson.ForgotPassword.hidden=true
|
||||
lesson.ParameterInjection.hidden=true
|
||||
lesson.RemoteAdminFlaw.hidden=true
|
||||
lesson.ChallengeScreen.hidden=true
|
@ -0,0 +1,49 @@
|
||||
category.General.ranking=11
|
||||
lesson.HttpBasics.ranking=10
|
||||
lesson.ThreadSafetyProblem.ranking=20
|
||||
|
||||
category.Broken\ Authentication\ and\ Session\ Management.ranking=21
|
||||
lesson.BasicAuthentication.ranking=10
|
||||
lesson.WeakAuthenticationCookie.ranking=20
|
||||
|
||||
category.Broken\ Access\ Control.ranking=31
|
||||
lesson.AccessControlMatrix.ranking=10
|
||||
lesson.PathBasedAccessControl.ranking=20
|
||||
|
||||
category.Cross-Site\ Scripting\ (XSS).ranking=41
|
||||
lesson.StoredXss.ranking=10
|
||||
lesson.ReflectedXSS.ranking=20
|
||||
|
||||
category.Unvalidated\ Parameters.ranking=51
|
||||
lesson.HiddenFieldTampering.ranking=10
|
||||
lesson.JavaScriptValidation.ranking=20
|
||||
lesson.UncheckedEmail.ranking=30
|
||||
|
||||
category.Insecure\ Storage.ranking=61
|
||||
lesson.Encoding.ranking=10
|
||||
|
||||
category.Injection\ Flaws.ranking=71
|
||||
lesson.SqlNumericInjection.ranking=10
|
||||
lesson.SqlStringInjection.ranking=20
|
||||
lesson.CommandInjection.ranking=30
|
||||
|
||||
category.Improper\ Error\ Handling.ranking=81
|
||||
lesson.FailOpenAuthentication.ranking=10
|
||||
|
||||
category.Code\ Quality.ranking=91
|
||||
lesson.HtmlClues.ranking=10
|
||||
|
||||
category.Web\ Services.category.ranking=101
|
||||
lesson.SoapRequest.ranking=10
|
||||
lesson.WSDLScanning.ranking=20
|
||||
lesson.WsSqlInjection.ranking=30
|
||||
|
||||
lesson.WeakSessionID.hidden=true
|
||||
lesson.BufferOverflow.hidden=true
|
||||
lesson.BlindSqlInjection.hidden=true
|
||||
lesson.DOS_Login.hidden=true
|
||||
lesson.ForcedBrowsing.hidden=true
|
||||
lesson.ForgotPassword.hidden=true
|
||||
lesson.ParameterInjection.hidden=true
|
||||
lesson.RemoteAdminFlaw.hidden=true
|
||||
lesson.ChallengeScreen.hidden=true
|
@ -0,0 +1 @@
|
||||
#lesson.BufferOverflow.hidden=true
|
@ -0,0 +1,2 @@
|
||||
#lessonTitle {position:absolute;left:94px;top:75px;width:690px;height:22px;z-index:1;float: right;font-size: 20px;color: #FFFFFF;}
|
||||
#hMenuBar {position:absolute;left:245px;top:108px;width:538px;height:22px;z-index:2;}
|
11
webgoat/main/project/JavaSource/WebContent/css/lesson.css
Normal file
@ -0,0 +1,11 @@
|
||||
body.page {color: #000000;font-family: Verdana, Tahoma, sans-serif;font-size: 8pt;}
|
||||
td {font-family: Verdana, Tahoma, sans-serif;font-size: 8pt; }
|
||||
tr {font-family: Verdana, Tahoma, sans-serif;}
|
||||
span {font-family: Verdana, Tahoma, sans-serif;}
|
||||
.f8-0 {font-size: 8pt;font-family: Verdana, Tahoma, sans-serif;}
|
||||
.f8-1 {font-size: 8pt;font-family: Verdana, Tahoma, sans-serif;}
|
||||
.div_tree {padding-left:10px;overflow:visible;}
|
||||
.report_tree_link {width:100%;font-size: 8pt;font-family: Verdana, Tahoma, sans-serif;margin-left:2px;padding-right:2px;margin-top:2px;border-spacing:0px;}
|
||||
.form_link {font-size: 8pt;font-family: Verdana, Tahoma, sans-serif;font-weight: bold;}
|
||||
.report_title {font-size: 8pt;font-family: Verdana, Tahoma, sans-serif;border: 1px solid #afafaf;background-color: #cfcfef;margin-top:3px;margin-bottom:3px;margin-left:1px;padding:3px;font-weight: bold;}
|
||||
.middle {vertical-align:middle;}
|
7
webgoat/main/project/JavaSource/WebContent/css/menu.css
Normal file
@ -0,0 +1,7 @@
|
||||
.pviimenudiv td {font-family: "Trebuchet MS", Arial, sans-serif; font-size: 10px}
|
||||
.pviimenudiv p {font-family: "Trebuchet MS", Arial, sans-serif; font-size: 10px; margin-top: 12px; margin-bottom: 6px}
|
||||
.pviimenudiv b {font-family: Verdana, Arial, Helvetica, sans-serif; font-style: normal; color: #666666}
|
||||
.pviimenudiv a:link {color: #333333; text-decoration: underline}
|
||||
.pviimenudiv a:visited {color: #0066FF; text-decoration: underline}
|
||||
.pviimenudiv a:hover {color: red; text-decoration: underline}
|
||||
.pviimenudiv a:active {color: #0066FF; text-decoration: underline}
|
274
webgoat/main/project/JavaSource/WebContent/css/webgoat.css
Normal file
@ -0,0 +1,274 @@
|
||||
body{
|
||||
min-width: 800px;
|
||||
font-family: Arial,sans-serif;
|
||||
color: #333333;
|
||||
line-height: 1.166;
|
||||
margin: 0px;
|
||||
padding: 0px;
|
||||
}
|
||||
|
||||
a:link, a:visited, a:hover {
|
||||
color: #666666;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
a:hover {
|
||||
text-decoration: underline;
|
||||
color: red;
|
||||
}
|
||||
|
||||
h1, h2, h3, h4, h5, h6 {
|
||||
font-family: Arial,sans-serif;
|
||||
margin: 0px;
|
||||
padding: 0px;
|
||||
}
|
||||
|
||||
h1{
|
||||
font-family: Verdana,Arial,sans-serif;
|
||||
font-size: 120%;
|
||||
color: #333333;
|
||||
}
|
||||
|
||||
h2{
|
||||
font-size: 114%;
|
||||
color: #333333;
|
||||
}
|
||||
|
||||
h3{
|
||||
font-size: 100%;
|
||||
color: #334d55;
|
||||
}
|
||||
|
||||
h4{
|
||||
font-size: 100%;
|
||||
font-weight: normal;
|
||||
color: #333333;
|
||||
}
|
||||
|
||||
h5{
|
||||
font-size: 100%;
|
||||
color: #334d55;
|
||||
}
|
||||
|
||||
ul{
|
||||
list-style-type: square;
|
||||
}
|
||||
|
||||
ul ul{
|
||||
list-style-type: disc;
|
||||
}
|
||||
|
||||
ul ul ul{
|
||||
list-style-type: none;
|
||||
}
|
||||
|
||||
#navBar{
|
||||
margin: 0 79% 0 0;
|
||||
padding: 0px;
|
||||
background-color: #999999;
|
||||
}
|
||||
|
||||
#twoCol{
|
||||
margin: 0;
|
||||
padding-left: 13px;
|
||||
}
|
||||
|
||||
#siteName{
|
||||
margin: 0px;
|
||||
padding: 0px 0px 10px 10px;
|
||||
}
|
||||
|
||||
#lessonName{
|
||||
padding: 5px 0px 10px 10px;
|
||||
}
|
||||
|
||||
#globalNav{
|
||||
color: #cccccc;
|
||||
padding: 0px 10px;
|
||||
white-space: nowrap;
|
||||
}
|
||||
|
||||
#globalNav img{
|
||||
display: block;
|
||||
}
|
||||
|
||||
#globalNav a {
|
||||
font-size: 10px;
|
||||
padding: 0px 4px 0px 0px;
|
||||
}
|
||||
|
||||
.lessonContent{
|
||||
padding: 10px 10px 10px 10px;
|
||||
font-size: 10px;
|
||||
}
|
||||
|
||||
.lessonText h3{
|
||||
padding: 30px 0px 5px 0px;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
.lessonText img{
|
||||
float: left;
|
||||
padding: 0px 10px 0px 0px;
|
||||
margin: 0 5px 5px 0;
|
||||
}
|
||||
|
||||
#bottom{
|
||||
color: #999999;
|
||||
clear: both;
|
||||
font-size: 10px;
|
||||
padding-top: 5px;
|
||||
}
|
||||
|
||||
#navBar ul a:link, #navBar ul a:visited {}
|
||||
|
||||
#navBar ul {
|
||||
list-style: none;
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
}
|
||||
|
||||
/* hack to fix IE/Win's broken rendering of block-level anchors in lists */
|
||||
#navBar li {}
|
||||
|
||||
/* fix for browsers that don't need the hack */
|
||||
html>body #navBar li {}
|
||||
|
||||
#top{
|
||||
height:136px;
|
||||
background-image: url(../images/header/header.jpg);
|
||||
width: 800px;
|
||||
}
|
||||
|
||||
#top_challenge{
|
||||
height:136px;
|
||||
width: 800px;
|
||||
}
|
||||
|
||||
#topLinks{
|
||||
position: relative;
|
||||
margin: 0px;
|
||||
padding: 0px;
|
||||
font-size: small;
|
||||
}
|
||||
|
||||
#topLinks h3{
|
||||
padding: 10px 0px 2px 10px;
|
||||
}
|
||||
|
||||
#topLinks a:link{
|
||||
padding: 2px 0px 2px 10px;
|
||||
width: 100%;voice-family: "\"}\"";
|
||||
voice-family:inherit;
|
||||
width: auto;
|
||||
}
|
||||
|
||||
#topLinks a:visited{
|
||||
border-top: 1px solid #cccccc;
|
||||
padding: 2px 0px 2px 10px;
|
||||
}
|
||||
|
||||
#topLinks a:hover{
|
||||
background-color: #FFFFFF;
|
||||
padding: 5px 2px 2px 10px;
|
||||
}
|
||||
|
||||
#menuSpacer {
|
||||
float: left;
|
||||
width: 225px;
|
||||
}
|
||||
|
||||
#lessonArea {
|
||||
float: right;
|
||||
width: 540px;
|
||||
height: 100%;
|
||||
padding: 10px;
|
||||
}
|
||||
|
||||
#wrap {
|
||||
width: 800px;
|
||||
word-wrap:break-word; /* Fixes IE wrapping issue */
|
||||
}
|
||||
|
||||
#topRight {
|
||||
position:absolute;
|
||||
left:715px;
|
||||
top:0px;
|
||||
width:75px;
|
||||
height:23px;
|
||||
z-index:3;
|
||||
float: right;
|
||||
}
|
||||
|
||||
#topRightInner {
|
||||
position:absolute;
|
||||
left:450px;
|
||||
top:10px;
|
||||
width:300px;
|
||||
height:23px;
|
||||
z-index:4;
|
||||
float: right;
|
||||
}
|
||||
|
||||
.info {
|
||||
color: red;
|
||||
font-weight: bold;
|
||||
}
|
||||
|
||||
#reset {
|
||||
text-align: right;
|
||||
font-weight: bold;
|
||||
margin-bottom: 10px;
|
||||
}
|
||||
|
||||
#hint{}
|
||||
#parameter{}
|
||||
#cookie{}
|
||||
#message{
|
||||
margin-bottom: 20px;
|
||||
margin-top: 10px;
|
||||
}
|
||||
|
||||
#lessonPlans {
|
||||
border: 1px solid #000000;
|
||||
background-color: #FFFFFF;
|
||||
margin: 15px;
|
||||
padding: 25px;
|
||||
padding-bottom: 75px;
|
||||
}
|
||||
|
||||
#credits {
|
||||
float: right;
|
||||
}
|
||||
|
||||
#start {
|
||||
height: 300px;
|
||||
width: 700px;
|
||||
padding: 10px 50px 10px 50px;
|
||||
font-size: 12px;
|
||||
}
|
||||
#warning {
|
||||
border: 1px solid #666666;
|
||||
padding: 10px;
|
||||
font-size: 10px;
|
||||
color: #FF3300;
|
||||
width: 600px;
|
||||
margin-left: 100px;
|
||||
margin-right: 100px;
|
||||
}
|
||||
#team {
|
||||
width: 580px;
|
||||
margin-right: 50px;
|
||||
margin-left: 50px;
|
||||
padding-top: 5px;
|
||||
padding-right: 10px;
|
||||
padding-bottom: 5px;
|
||||
padding-left: 10px;
|
||||
}
|
||||
.style1 {
|
||||
font-size: 10px;
|
||||
font-weight: bold;
|
||||
}
|
||||
.style2 {
|
||||
font-size: 10px;
|
||||
}
|
@ -0,0 +1,42 @@
|
||||
#bottom_ch{
|
||||
color: #999999;
|
||||
clear: both;
|
||||
font-size: 10px;
|
||||
padding-top: 5px;
|
||||
}
|
||||
|
||||
#top_ch{
|
||||
height:86px;
|
||||
width: 500px;
|
||||
}
|
||||
|
||||
#wrap_ch {
|
||||
width: 500px;
|
||||
}
|
||||
|
||||
#credits_ch {
|
||||
float: right;
|
||||
}
|
||||
|
||||
#start_ch {
|
||||
height: 300px;
|
||||
padding: 10px 50px 10px 50px;
|
||||
font-size: 12px;
|
||||
}
|
||||
#warning_ch {
|
||||
border: 1px solid #666666;
|
||||
padding: 10px;
|
||||
font-size: 10px;
|
||||
color: #FF3300;
|
||||
width: 400px;
|
||||
margin-left: 50px;
|
||||
}
|
||||
#team_ch {
|
||||
}
|
||||
.style1_ch {
|
||||
font-size: 10px;
|
||||
font-weight: bold;
|
||||
}
|
||||
.style2_ch {
|
||||
font-size: 10px;
|
||||
}
|
365
webgoat/main/project/JavaSource/WebContent/database/database.prp
Normal file
@ -0,0 +1,365 @@
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! BASIC PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! Path where index tables are held. Can be absolute or relative
|
||||
! to the properties file. Defaults to tablePath.
|
||||
!
|
||||
indexPath=./indexes
|
||||
!
|
||||
! Path where system tables are held. Can be absolute or relative to
|
||||
! the properties file. Defaults to tablePath.
|
||||
!
|
||||
systemPath=./system
|
||||
!
|
||||
! Path where database tables are held. Can be absolute or relative
|
||||
! to the properties file. Defaults to "current" directory.
|
||||
!
|
||||
tablePath=./tables
|
||||
!
|
||||
! Path where results set tables are held. Can be absolute or relative
|
||||
! to the properties file. Defaults to tablePath.
|
||||
!
|
||||
tmpPath=./tmp
|
||||
!
|
||||
! Non-zero means paths are relative to the properties file.
|
||||
! Default is absolute paths for files.
|
||||
!
|
||||
relativeToProperties=1
|
||||
!
|
||||
! Alternative partitions can be defined so that tables can be placed
|
||||
! in multiple locations. Each partition is numbered: 1, 2, 3,... Tables
|
||||
! can be created on partitions using the syntax
|
||||
!
|
||||
! CREATE TABLE <name> ON PARTITION <number>...
|
||||
!
|
||||
! The partition count has to be supplied.
|
||||
!
|
||||
!partitionCount=2
|
||||
!
|
||||
! The locations of each partition must be supplied. These are always
|
||||
! absolute path names.
|
||||
!
|
||||
!partition1=d:/petes
|
||||
!partition2=c:/temp
|
||||
|
||||
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! TUNING PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! The amount of each column to cache, expressed either as an absolute
|
||||
! number of rows or as a percentage figure. Defaults to 256 or 10 respectively.
|
||||
!
|
||||
! This value applies only when tables are first created. It has no effect
|
||||
! when a table is being re-opened.
|
||||
!
|
||||
cacheAmount=512
|
||||
!
|
||||
! CACHE_ROWS Must be one of CACHE_ROWS or CACHE_PERCENT. Determines whether
|
||||
! to cache columns in tables based on an absolute number of rows, or the
|
||||
! percentage number of rows in the table.
|
||||
!
|
||||
! This value applies only when tables are first created. It has no effect
|
||||
! when a table is being re-opened.
|
||||
!
|
||||
cacheCondition=CACHE_ROWS
|
||||
!
|
||||
! The amount of the system tables to be cached. Defaults to 100.
|
||||
!
|
||||
! This value applies only when tables are first created. It has no effect
|
||||
! when a table is being re-opened.
|
||||
!
|
||||
!systemCacheSize=10
|
||||
!
|
||||
! Similar to cacheCondition, but applies only to the system tables.
|
||||
!
|
||||
! This value applies only when tables are first created. It has no effect
|
||||
! when a table is being re-opened.
|
||||
!
|
||||
!systemCacheCondition=CACHE_ROWS
|
||||
!
|
||||
! The percentage cache hit improvement required in order to move the
|
||||
! cache to a new location in a column.
|
||||
!
|
||||
! (Currently not implemented).
|
||||
!
|
||||
cacheResetPercent=10
|
||||
!
|
||||
! Non-zero means that database changes do not get written to the
|
||||
! database immediately. See tuning.html.
|
||||
!
|
||||
fastUpdate=0
|
||||
!
|
||||
! Percentage of free space in an index that must be present before
|
||||
! the index reorganises itself. High values means frequent index
|
||||
! reorganisation. Low values means slow index inserts.
|
||||
!
|
||||
indexLoad=5
|
||||
!
|
||||
! The number of cache misses to include in calculations of the next
|
||||
! base for the cache.
|
||||
!
|
||||
! (Currently not implemented).
|
||||
!
|
||||
missesInCacheStats=100
|
||||
!
|
||||
! Non-zero means that results sets get instantiated on disk. By default
|
||||
! InstantDB holds results sets emtirely in memory (apart from Binary
|
||||
! columns). For large results sets this can be a problem. This property
|
||||
! forces all results sets to be held on disk.
|
||||
!
|
||||
resultsOnDisk=0
|
||||
!
|
||||
! Similar to cacheCondition but applies only to disk based
|
||||
! results sets. Default is CACHE_ROWS.
|
||||
!
|
||||
resultsSetCache=CACHE_ROWS
|
||||
!
|
||||
! Similar to cacheAmount but applies only to disk based
|
||||
! results sets. Default is 100.
|
||||
!
|
||||
resultsSetCacheAmount=100
|
||||
!
|
||||
! Number of rows to read into the disk read ahead buffer.
|
||||
! Recommended to be set somewhere around 128 to 256.
|
||||
! Default is 20.
|
||||
!
|
||||
rowCacheSize=128
|
||||
!
|
||||
! The read ahead buffer is effective at speeding up full
|
||||
! table scans. However for indexed lookups or multiple
|
||||
! simultaneous scans it is better to read a single row at
|
||||
! a time. Each table holds a small number of single row
|
||||
! buffers to improve such operations. Default is 8.
|
||||
!
|
||||
!singleRowCount=4
|
||||
!
|
||||
! Sometimes the look ahead buffer can be held by a single
|
||||
! thread even though it is not retrieveing many values from it.
|
||||
! If too many lookups retrieve data from the single row
|
||||
! buffers then it is better to flush the look ahead buffer and
|
||||
! make it available for re-use. Default is 128.
|
||||
!
|
||||
!flushAfterCacheMisses=64
|
||||
!
|
||||
! Number of rows to read ahead for system tables. By default
|
||||
! system tables cache everything, so it is wasteful to have large
|
||||
! read ahead buffers since they will very rarely be used. This
|
||||
! allows the size of the system read ahead buffers to be reduced
|
||||
! if necessary. Defaults to rowCacheSize.
|
||||
!
|
||||
!systemRows=20
|
||||
!
|
||||
! The control column in all tables normally has a large cache
|
||||
! since this speeds up all operation on that table. This can be
|
||||
! varied to either improve performance or to reduce space.
|
||||
! default is 8192.
|
||||
!
|
||||
! This value applies only when tables are first created. It has no effect
|
||||
! when a table is being re-opened.
|
||||
!
|
||||
!controlColCacheSize=512
|
||||
!
|
||||
! By default, InstantDB only does a cursory search for deleted rows during
|
||||
! UPDATE statements. Setting searchDeletes=1 causes more detailed searches
|
||||
! for deleted rows. This slows down UPDATE executions, but reults in more
|
||||
! compact tables. Default is 0.
|
||||
!
|
||||
searchDeletes=0
|
||||
!
|
||||
! The interval, in milliseconds, between checks for statement execution
|
||||
! timeouts. Default is 5000.
|
||||
!
|
||||
!timerCheck=5000
|
||||
!
|
||||
! The number of statements between checks on available memory. If set
|
||||
! to 100 (say), then every 100 statements, InstantDB will check to
|
||||
! see how much memory is still free. If too little is avilable (see
|
||||
! below) then java.lang.System.gc() is called.
|
||||
!
|
||||
! If set to zero (the default) then no memory checking takes place.
|
||||
!
|
||||
!garbageCollectStatements=100
|
||||
!
|
||||
! If InstantDB is performing period memory checks (see above) then
|
||||
! this is the value in percent of available memory that must be
|
||||
! used before System.gc() gets called.
|
||||
!
|
||||
!garbageCollectPercent=70
|
||||
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! LOGGING AND DEBUGGING PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! Non-zero means include SQL statements in the export file.
|
||||
!
|
||||
exportSQL=0
|
||||
!
|
||||
! Non-zero means trace output also directed to console.
|
||||
! Defaults to 0.
|
||||
!
|
||||
traceConsole=1
|
||||
!
|
||||
! Relative or absolute path where exporting and tracing goes.
|
||||
!
|
||||
! NOTE - A relative path is relative to the current Java
|
||||
! runtime directory. It is *not* relative to this properties
|
||||
! file. This is regardless of the relativeToProperties
|
||||
! setting above.
|
||||
!
|
||||
traceFile=./trace.log
|
||||
!
|
||||
! Bitmap of various items that can be traced. See debug.html.
|
||||
! Defaults to 0.
|
||||
!
|
||||
traceLevel=2
|
||||
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! TRANSACTION AND RECOVERY PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! 0 means do not perform recovery on startup.
|
||||
! 1 means perform automatic recovery
|
||||
! 2 (default) means prompt the user using standard in
|
||||
!
|
||||
recoveryPolicy=1
|
||||
!
|
||||
! Sets the level of transaction journalling. See trans.html.
|
||||
! Defaults to 1.
|
||||
!
|
||||
! 0 - No journalling takes place.
|
||||
! 1 - Normal journalling (default).
|
||||
! 2 - Full journalling.
|
||||
!
|
||||
transLevel=1
|
||||
!
|
||||
! When doing an import, defines the number of rows imported
|
||||
! before the transaction is committed. Recommended value 8192.
|
||||
! defaults to 100.
|
||||
!
|
||||
transImports=100
|
||||
!
|
||||
! Sets the default transaction isolation level. This is a complex
|
||||
! topic, but basically, the higher the level, the more locking
|
||||
! goes on. The allowed values are:
|
||||
!
|
||||
! TRANSACTION_READ_UNCOMMITTED = 1
|
||||
! TRANSACTION_READ_COMMITTED = 2
|
||||
! TRANSACTION_REPEATABLE_READ = 4
|
||||
! TRANSACTION_SERIALIZABLE = 8 (default)
|
||||
!
|
||||
! SERIALIZABLE means that InstantDB takes exclusive access to all
|
||||
! tables in a transaction until the transaction completes. Even if
|
||||
! the transaction only performs reads.
|
||||
!
|
||||
! REPEATABLE_READ transactions takes read locks for SELECTs and
|
||||
! write locks for everything else. All locks released on transaction
|
||||
! completion.
|
||||
!
|
||||
! READ_COMMITTED transactions are the same as REPEATABLE_READ
|
||||
! except that read locks get freed on statement completion.
|
||||
!
|
||||
! READ_UNCOMMITTED transactions do not take read locks. A result
|
||||
! set can include data being modified by another transaction.
|
||||
!
|
||||
!defaultIsolationLevel=2
|
||||
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! DATE, TIME AND CURRENCY PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! Number of digits after decimal point in currency outputs. Defaults to 2.
|
||||
!
|
||||
currencyDecimal=2
|
||||
!
|
||||
! Currency symbol used in currency outputs. Defaults to $.
|
||||
!
|
||||
currencySymbol=$
|
||||
!
|
||||
! Default format for date columns. Defaults to "yyyy-mm-dd".
|
||||
!
|
||||
!dateFormat=yyyy-mm-dd
|
||||
!
|
||||
! Default format for timestamp columns. Defaults to "yyyy-mm-dd hh:nn:ss.lll".
|
||||
!
|
||||
!dateTimeFormat=yyyy-mm-dd hh:nn:ss.lll
|
||||
!
|
||||
! Default format for time columns. Defaults to "hh:nn:ss.lll".
|
||||
!
|
||||
!timeFormat=hh:nn:ss.lll
|
||||
!
|
||||
! If set, then all two digit dates less than its value are interpreted
|
||||
! as 21st century dates.
|
||||
!
|
||||
!milleniumBoundary=50
|
||||
!
|
||||
! Set to 1 causes the date string "now" to store a full timestamp.
|
||||
! Default is to store only the date for fields with now hour in the
|
||||
! format string.
|
||||
!
|
||||
nowMeansTime=0
|
||||
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! STRING HANDLING PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! If set to 1 then String hashes use the JDK Object.hashCode() function.
|
||||
! By default, uses InstantDB's String hashing.
|
||||
!
|
||||
altStringHashing=0
|
||||
!
|
||||
! Set to 1 to cause LIKE clauses to always perform case insensitive
|
||||
! comparisons.
|
||||
!
|
||||
likeIgnoreCase=0
|
||||
!
|
||||
! Same as SET LITERAL STRICT_ON. Prevents string literals being interpreted
|
||||
! as column names or numbers. Default is 0.
|
||||
!
|
||||
strictLiterals=0
|
||||
!
|
||||
! Set this value to 1 (one) if you would like PreparedStatement.setString()
|
||||
! to ignore "\" (backslash) characters when proceesing string constants.
|
||||
! When set, InstantDB will not attempt to interpret \ as the start of an
|
||||
! escape sequence. Default is 0.
|
||||
!
|
||||
!prepareIgnoresEscapes=1
|
||||
|
||||
!---------------------------------------------------------------------
|
||||
!
|
||||
! MISCELLANEOUS PROPERTIES
|
||||
!
|
||||
!---------------------------------------------------------------------
|
||||
|
||||
!
|
||||
! Allows selected InstantDB keywords to be un-reserved.
|
||||
! e.g. ignoreKeywords=url,quote would allow the keywords
|
||||
! url and quote to be used as table or column names.
|
||||
!
|
||||
! This faciliy is provided for compatatbility reasons only.
|
||||
! It's use is not recommended AND IS NOT SUPPORTED.
|
||||
!
|
||||
!ignoreKeywords
|
||||
!
|
||||
! Non-zero means database is opened in read only mode.
|
||||
!
|
||||
readOnly=0
|
BIN
webgoat/main/project/JavaSource/WebContent/database/webgoat.mdb
Normal file
After Width: | Height: | Size: 549 B |
After Width: | Height: | Size: 2.2 KiB |
After Width: | Height: | Size: 3.8 KiB |
After Width: | Height: | Size: 1.3 KiB |
After Width: | Height: | Size: 690 B |
After Width: | Height: | Size: 1.2 KiB |
After Width: | Height: | Size: 1.0 KiB |
After Width: | Height: | Size: 482 B |
After Width: | Height: | Size: 1.9 KiB |
After Width: | Height: | Size: 1.0 KiB |
After Width: | Height: | Size: 476 B |
After Width: | Height: | Size: 1.9 KiB |
After Width: | Height: | Size: 3.1 KiB |
After Width: | Height: | Size: 1.7 KiB |
After Width: | Height: | Size: 2.9 KiB |
After Width: | Height: | Size: 613 B |
After Width: | Height: | Size: 784 B |
After Width: | Height: | Size: 2.6 KiB |
After Width: | Height: | Size: 2.1 KiB |
After Width: | Height: | Size: 3.5 KiB |
After Width: | Height: | Size: 2.0 KiB |
After Width: | Height: | Size: 3.3 KiB |
After Width: | Height: | Size: 81 KiB |
After Width: | Height: | Size: 83 KiB |
After Width: | Height: | Size: 83 KiB |
After Width: | Height: | Size: 84 KiB |
After Width: | Height: | Size: 83 KiB |
After Width: | Height: | Size: 798 B |
After Width: | Height: | Size: 33 KiB |
After Width: | Height: | Size: 16 KiB |
After Width: | Height: | Size: 3.6 KiB |
After Width: | Height: | Size: 49 B |
@ -0,0 +1,6 @@
|
||||
function MM_reloadPage(init) { //reloads the window if Nav4 resized
|
||||
if (init==true) with (navigator) {if ((appName=="Netscape")&&(parseInt(appVersion)==4)) {
|
||||
document.MM_pgW=innerWidth; document.MM_pgH=innerHeight; onresize=MM_reloadPage; }}
|
||||
else if (innerWidth!=document.MM_pgW || innerHeight!=document.MM_pgH) location.reload();
|
||||
}
|
||||
MM_reloadPage(true);
|
@ -0,0 +1,59 @@
|
||||
// Logout and Help Swap Image
|
||||
|
||||
function MM_reloadPage(init) { //reloads the window if Nav4 resized
|
||||
if (init==true) with (navigator) {if ((appName=="Netscape")&&(parseInt(appVersion)==4)) {
|
||||
document.MM_pgW=innerWidth; document.MM_pgH=innerHeight; onresize=MM_reloadPage; }}
|
||||
else if (innerWidth!=document.MM_pgW || innerHeight!=document.MM_pgH) location.reload();
|
||||
}
|
||||
MM_reloadPage(true);
|
||||
|
||||
function MM_swapImgRestore() { //v3.0
|
||||
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
|
||||
}
|
||||
|
||||
function MM_swapImage() { //v3.0
|
||||
var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-2);i+=3)
|
||||
if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src; x.src=a[i+2];}
|
||||
}
|
||||
|
||||
// Lesson Nav bar image swapping
|
||||
|
||||
function MM_preloadImages() { //v3.0
|
||||
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
|
||||
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
|
||||
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
|
||||
}
|
||||
|
||||
function MM_nbGroup(event, grpName) { //v6.0
|
||||
var i,img,nbArr,args=MM_nbGroup.arguments;
|
||||
if (event == "init" && args.length > 2) {
|
||||
if ((img = MM_findObj(args[2])) != null && !img.MM_init) {
|
||||
img.MM_init = true; img.MM_up = args[3]; img.MM_dn = img.src;
|
||||
if ((nbArr = document[grpName]) == null) nbArr = document[grpName] = new Array();
|
||||
nbArr[nbArr.length] = img;
|
||||
for (i=4; i < args.length-1; i+=2) if ((img = MM_findObj(args[i])) != null) {
|
||||
if (!img.MM_up) img.MM_up = img.src;
|
||||
img.src = img.MM_dn = args[i+1];
|
||||
nbArr[nbArr.length] = img;
|
||||
} }
|
||||
} else if (event == "over") {
|
||||
document.MM_nbOver = nbArr = new Array();
|
||||
for (i=1; i < args.length-1; i+=3) if ((img = MM_findObj(args[i])) != null) {
|
||||
if (!img.MM_up) img.MM_up = img.src;
|
||||
img.src = (img.MM_dn && args[i+2]) ? args[i+2] : ((args[i+1])? args[i+1] : img.MM_up);
|
||||
nbArr[nbArr.length] = img;
|
||||
}
|
||||
} else if (event == "out" ) {
|
||||
for (i=0; i < document.MM_nbOver.length; i++) {
|
||||
img = document.MM_nbOver[i]; img.src = (img.MM_dn) ? img.MM_dn : img.MM_up; }
|
||||
} else if (event == "down") {
|
||||
nbArr = document[grpName];
|
||||
if (nbArr)
|
||||
for (i=0; i < nbArr.length; i++) { img=nbArr[i]; img.src = img.MM_up; img.MM_dn = 0; }
|
||||
document[grpName] = nbArr = new Array();
|
||||
for (i=2; i < args.length-1; i+=2) if ((img = MM_findObj(args[i])) != null) {
|
||||
if (!img.MM_up) img.MM_up = img.src;
|
||||
img.src = img.MM_dn = (args[i+1])? args[i+1] : img.MM_up;
|
||||
nbArr[nbArr.length] = img;
|
||||
} }
|
||||
}
|
@ -0,0 +1,7 @@
|
||||
|
||||
function makeWindow(url, windowName)
|
||||
{
|
||||
day = new Date();
|
||||
id = day.getTime();
|
||||
eval("page" + id + " = window.open(url, '" + id + "', 'toolbar=0,location=0,scrollbars=1,statusbar=0,menubar=0,resizable=1,width=600,height=500');");
|
||||
}
|
@ -0,0 +1,140 @@
|
||||
function MM_findObj(n, d) {
|
||||
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
|
||||
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
|
||||
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
|
||||
for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
|
||||
if(!x && d.getElementById) x=d.getElementById(n); return x;
|
||||
}
|
||||
|
||||
function getHW(t,a) {
|
||||
var r,p,h=0,w=0;if((p=MM_findObj(a)) !=null){
|
||||
if(document.all || document.getElementById){h=parseInt(p.offsetHeight);w=parseInt(p.offsetWidth);
|
||||
if(!h){h=parseInt(p.style.pixelHeight);w=parseInt(p.style.pixelWidth);}
|
||||
}else if(document.layers){h=parseInt(p.clip.height);w=parseInt(p.clip.width);}}
|
||||
if(t=="width"){r=w;}else{r=h;}return r;
|
||||
}
|
||||
|
||||
function MM1dwt() {
|
||||
var g,lh,sw,fr = false;
|
||||
if(!document.mc)return;
|
||||
for(var x=0;x<m1.length;x++){tl=m1[x].id;lh="P7CM1DWT0"+tl;
|
||||
if((g=MM_findObj(lh)) !=null){fr=true;sw=0;break;}
|
||||
lh="P7CM1DWT1"+tl;if((g=MM_findObj(lh)) !=null){fr=true;sw=1;break;}}
|
||||
if(fr){eval("trigMenuMagic1('"+tl+"',"+sw+")");}
|
||||
}
|
||||
|
||||
function setMenuMagic1() {
|
||||
var s,d,g,g2,gg,ww,kx,th,tu,ts,nu,xx,k=0,pa=0;args=setMenuMagic1.arguments;
|
||||
if((parseInt(navigator.appVersion)>4 || navigator.userAgent.indexOf("MSIE")>-1)&& navigator.userAgent.indexOf("Opera")==-1){pa="px";}
|
||||
if(navigator.userAgent.indexOf("Opera")>-1){P7OperaW=window.innerWidth;P7OperaH=window.innerHeight;}
|
||||
if(!document.mc) { m3=new Array();
|
||||
m=new Array();document.mc=true;ms=new Array();document.imswap=new Array();document.imswapo=new Array();
|
||||
m1=new Array();m2=new Array();mprop=new Object();mprop.offset=args[0];mprop.rate=args[1];
|
||||
mprop.delay=args[2];mprop.bottom=args[3];
|
||||
if(document.layers){mprop.pageh = document.height;}}
|
||||
for(var x=4;x<args.length;x+=3){if((g=MM_findObj(args[x])) !=null){
|
||||
m[k]=args[x];g.imname=args[x+2];g.sub=args[x+1];m3[k]=0;
|
||||
g2=MM_findObj(args[x+2]);tu=g2.src;ts=tu.lastIndexOf(".");
|
||||
nu=tu.substring(0,ts)+"_open"+tu.substring(ts,tu.length);
|
||||
nu2=tu.substring(0,ts)+"_over"+tu.substring(ts,tu.length);
|
||||
document.imswap[k]=new Image();document.imswap[k].src=tu;
|
||||
document.imswapo[k]=new Image();document.imswapo[k].src=tu;k++;}}
|
||||
var lf=0;for (var j=0;j<m.length;j++){
|
||||
if((g=MM_findObj(m[j])) !=null){d=(document.layers)?g:g.style;m1[j]=g;g.waiting=false;
|
||||
if(j==0){lf=parseInt(d.left);th=parseInt(d.top);}
|
||||
if(j>0){d.left=(lf+pa);th+=getHW('height',m[j-1]);d.top=(th+pa);}
|
||||
if((s=MM_findObj(g.sub)) !=null){m2[j]=s;ww=getHW('width',g.sub);
|
||||
kx=lf-ww-30;dd=(document.layers)?s:s.style;
|
||||
dd.left=(kx+pa);dd.top=(th+pa);ms[j]=th;dd.visibility="visible";s.open=false;s.waiting=false;}}}
|
||||
if((g=MM_findObj(mprop.bottom)) !=null){d=(document.layers)?g:g.style;
|
||||
d.left=(lf+parseInt(args[0])+pa);th+=getHW('height',m[m.length-1]);d.top=(th+pa);}
|
||||
}
|
||||
|
||||
function BM1(el,x,y,a,b,c,s) {
|
||||
var g,elo=el,f="",m=false,d="";x=parseInt(x);y=parseInt(y);
|
||||
var t = 'g.BM = setTimeout("BM1(\''+elo+'\',';
|
||||
if ((g=MM_findObj(el))!=null) {d=(document.layers)?g:g.style;}else{return;}
|
||||
var xx=(parseInt(d.left))?parseInt(d.left):0;
|
||||
var yy=(parseInt(d.top))?parseInt(d.top):0;
|
||||
var i=parseInt(a);
|
||||
if (eval(g.moved)){clearTimeout(g.BM);}
|
||||
if (xx<x){xx+=i;m=true;if(xx>x){xx=x;}}
|
||||
if (xx>x){xx-=i;m=true;if(xx<x){xx=x;}}
|
||||
if (yy<y){yy+=i;m=true;if(yy>y){yy=y;}}
|
||||
if (yy>y){yy-=i;m=true;if(yy<y){yy=y;}}
|
||||
if (m) {
|
||||
if((parseInt(navigator.appVersion)>4 || navigator.userAgent.indexOf("MSIE")>-1)&& navigator.userAgent.indexOf("Opera")==-1){
|
||||
xx+="px";yy+="px";}d.left=xx;d.top=yy;g.moved=true;eval(t+x+','+y+','+a+','+b+','+c+',0)",'+b+')');
|
||||
}else {g.moved=false;wait(elo);}
|
||||
}
|
||||
|
||||
function wait(a) {
|
||||
var ma,mb;if((mb=MM_findObj(a)) !=null){
|
||||
if(!mb.waiting || mb.waiting=="none"){return;}
|
||||
ma=mb.waiting;mb.waiting=false;eval(ma);}
|
||||
}
|
||||
|
||||
function trigMenuMagic1(a,sw) {
|
||||
var x,g,gg,d,dd,w,lp,tp,im,im2,ts,nu,e,pa=0;if(!document.mc)return;
|
||||
if((parseInt(navigator.appVersion)>4 || navigator.userAgent.indexOf("MSIE")>-1)&& navigator.userAgent.indexOf("Opera")==-1){pa="px";}
|
||||
if(navigator.userAgent.indexOf("Opera")>-1){if( P7OperaW!=window.innerWidth || P7OperaH!=window.innerHeight)setMenuMagic1();}
|
||||
var ofs=parseInt(mprop.offset),trt = parseInt(mprop.rate);
|
||||
var tdy=parseInt(mprop.delay),tsb,tlf,tst;for(x=0;x<m.length;x++){
|
||||
if(m[x]==a){d=m1[x];dd=(document.layers)?d:d.style;g=m2[x];gg=(document.layers)?g:g.style;
|
||||
e=MM_findObj(d.imname);im=e.src;ts=im.replace("_open","");ts=ts.replace("_over","");
|
||||
if(!g.open){tst="closed";im2=ts.lastIndexOf(".");
|
||||
nu=ts.substring(0,im2)+"_open"+ts.substring(im2,ts.length);ts = nu;}else{tst="open"}break;}}
|
||||
if(document.mm1Q){trt=20000;document.mm1Q=false;}
|
||||
for(j=0;j<m.length;j++){
|
||||
d=m1[j];dd=(document.layers)?d:d.style;g=m2[j];gg=(document.layers)?g:g.style;
|
||||
if(j==0){tlf=parseInt(dd.left);}if(g.open){
|
||||
w=getHW('width',d.sub)+30;w-=parseInt(dd.left);w*=-1;d.waiting=false;
|
||||
eval("BM1('"+d.sub+"',"+w+","+parseInt(gg.top)+","+20000+","+tdy+",0,0)");}
|
||||
d.waiting=false;g.open=false;
|
||||
if(parseInt(sw)==1){e=MM_findObj(d.imname);im=e.src;im2=im.replace("_open","");e.src=im2;}}
|
||||
var tnt=new Array();var df=0,tcd=0,tdl=m[0];for(j=0;j<m.length;j++){
|
||||
d=m1[j];dd=(document.layers)?d:d.style;g=m2[j];gg=(document.layers)?g:g.style;
|
||||
if(j==0){th=parseInt(dd.top);}tnt[j]=th;df=Math.abs(parseInt(dd.top)-th);
|
||||
if(df>tcd){tdl=m[j];tcd=df;}th+=getHW('height',m[j]);
|
||||
if(x==j && tst=="closed"){tsb=th;if(m3[j]!=1){th+=getHW('height',d.sub);}}ms[j]=th;}
|
||||
if(tst=="closed"){d=m1[x];dd=(document.layers)?d:d.style;
|
||||
g=m2[x];gg=(document.layers)?g:g.style;lp=tlf+ofs;
|
||||
gg.top=(tsb+pa);ms[x]=tsb;e=MM_findObj(d.imname);if(parseInt(sw)==1){e.src=ts;}
|
||||
g.open=true;if(m3[x]!=1){gg.visibility="visible";var r;r=MM_findObj(tdl);
|
||||
r.waiting="BM1('"+d.sub+"',"+lp+","+tsb+","+20000+","+tdy+",0,0)" ;}
|
||||
}else{d=m1[m1.length-1];d.waiting="none";}
|
||||
for(j=0;j<m.length;j++ ){eval("BM1('"+m[j]+"',"+tlf+","+tnt[j]+","+trt+","+tdy+",0,0)");}
|
||||
if((g=MM_findObj(mprop.bottom)) !=null){d=(document.layers)?g:g.style;g.waiting=false;
|
||||
eval("BM1('"+mprop.bottom+"',"+(tlf+ofs)+","+th+","+trt+","+tdy+",0,0)");
|
||||
th+=(document.layers)?getHW('height',mprop.bottom):0;}
|
||||
if(document.layers){var tw2=document.width;
|
||||
if(document.height<th) {document.height=th;document.width=tw2;}}
|
||||
}
|
||||
|
||||
function rollCMenu1(ev,a,b) {
|
||||
var e,im,ts,j,nu,g,x,tev=ev.type;
|
||||
if(!document.mc)return;
|
||||
if(tev=="mouseover"){for(x=0;x<m.length;x++){
|
||||
if(m[x]==a){g=m2[x];if(parseInt(b)==0 && g.open) {break;return;}
|
||||
e=MM_findObj(m1[x].imname);im=e.src;ts=im.replace("_open","");
|
||||
ts=ts.replace("_over","");j=ts.lastIndexOf(".");
|
||||
e.src=ts.substring(0,j)+"_over"+ts.substring(j,ts.length);break;}}
|
||||
}else if(tev=="mouseout"){for(x=0;x<m.length;x++){
|
||||
if(m[x]==a){e=MM_findObj(d=m1[x].imname);im=e.src;
|
||||
g=m2[x];ts=im.replace("_open","");ts=ts.replace("_over","");
|
||||
if(g.open){j=ts.lastIndexOf(".");
|
||||
nu=ts.substring(0,j)+"_open"+ts.substring(j,ts.length);
|
||||
}else{nu=ts;}e.src=nu;break;}}}
|
||||
}
|
||||
|
||||
function trigMM1url(param,opt){
|
||||
var ur,x,i,nv,mn,pr=new Array();
|
||||
ur=document.URL;x=ur.indexOf("?");
|
||||
if(x>1){pr=ur.substring(x+1,ur.length).split("&");
|
||||
for(i=0;i<pr.length;i++){nv=pr[i].split("=");
|
||||
if(nv.length>0){if(unescape(nv[0])==param){
|
||||
mn="menu"+unescape(nv[1]);
|
||||
eval("trigMenuMagic1('"+mn+"',"+opt+")");}}}}
|
||||
}
|
||||
|
||||
document.mm1Q=true;
|
@ -0,0 +1,40 @@
|
||||
var iframe;
|
||||
|
||||
function initIframe() {
|
||||
var body;
|
||||
var element;
|
||||
|
||||
body = document.getElementsByTagName('body')[0];
|
||||
element = document.getElementById('lessonPlans');
|
||||
|
||||
iframe = document.createElement('iframe');
|
||||
iframe.style.position = "absolute";
|
||||
iframe.style.visibility = "hidden";
|
||||
body.appendChild(iframe);
|
||||
|
||||
// Configure the iFrame to border the lessonPlan
|
||||
document.getElementsByTagName('body')[0].appendChild(element);
|
||||
iframe.style.height = element.offsetHeight;
|
||||
iframe.style.left = '275px';
|
||||
iframe.style.top = '145px';
|
||||
iframe.style.width = '474px';
|
||||
}
|
||||
|
||||
|
||||
function toggle(id) {
|
||||
element = document.getElementById(id);
|
||||
|
||||
if (!element) return;
|
||||
|
||||
if (element.style.visibility=='visible' || element.style.visibility=='') {
|
||||
iframe.style.visibility = 'hidden';
|
||||
element.style.visibility = 'hidden';
|
||||
element.style.overflow = 'hidden';
|
||||
element.style.height='1';
|
||||
} else {
|
||||
iframe.style.visibility= 'visible';
|
||||
element.style.visibility = 'visible';
|
||||
element.style.overflow = 'visible';
|
||||
element.style.height='';
|
||||
}
|
||||
}
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> Using an Access Control Matrix</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
In role-based access control scheme, a role represents a set of access permissions and privileges. A user can be assigned one or more roles. A role-based access control normally consists of two parts: role permission management and role assignment. A broken role-based access control scheme might allow a user to perform accesses that are not allowed by his/her assigned roles, or somehow obtain unauthorized roles.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
Each user is a member of a role that is allowed to access only certain resources. Your goal is to explore the access control rules that govern this site. Only the [Admin] group should have access to the 'Account Manager' resource.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> Basic Authentication </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b></p>
|
||||
<!-- Start Instructions -->
|
||||
Basic Authentication is used to protect server side resources. The web server will send a 401 authentication request with the response for the requested resource. The client side browser will then prompt the user for a user name and password using a browser supplied dialog box. The browser will base64 encode the user name and password and sendthose credentials back to the web server. The web server will then validate the credentials and return the requested resource if the credentials are correct. These credentials are automatically resent for each page protected with this mechanism without requiring the user to enter their credentials again.<br/>
|
||||
<p><b>General Goal(s):</b></p>
|
||||
For this lesson, your goal is to understand Basic Authentication and answer the questions below.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,15 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Blind SQL Injection </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.
|
||||
<br>
|
||||
Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This lesson will show the student several examples of SQL injection.<br>
|
||||
<br>
|
||||
It is always good practice to sanitize all input data, especially data that will used in OS command, scripts, and database queiries.<br>
|
||||
<!-- Stop Instructions -->
|
||||
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The form below allows a user to enter an account number and determine if it is valid or not. Use this form to develop a true / false test check other entries in the database.<br><br>Reference Ascii Values: 'A' = 65 'Z' = 90 'a' = 97 'z' = 122<br><br>The goal is to find the value of the first_name in table user_data for userid 15613. Put that name in the form to pass the lesson.
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Exploit Buffer Overflows</p>
|
||||
</div>
|
||||
<!-- Start Instructions -->
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
How to Exploit Buffer Overflows.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
This lesson needs a creator!
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,7 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> Putting it all together </p>
|
||||
</div><br/>
|
||||
<p><b>Concept / Topic To Teach:</b></p>
|
||||
This lesson creates a challenge that will help the student apply all that they have learned.<br/>
|
||||
<b>General Goal(s):</b><br/>
|
||||
Display the secret message.
|
@ -0,0 +1,11 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Command Injection</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b></p>
|
||||
<!-- Start Instructions -->
|
||||
Command injection attacks represent a serious threat to any parameter-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.<br/>
|
||||
Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This lesson will show the student several examples of parameter injection.<br/>
|
||||
It is always good practice to sanitize all input data, especially data that will used in OS command, scripts, and database queries.<br/>
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b></p>
|
||||
The user should be able to execute any command on the hosting OS.
|
@ -0,0 +1,11 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Cross Site Scripting (XSS)</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b></p>
|
||||
<!-- Start Instructions -->
|
||||
It is always a good practice to scrub all inputs, especially those inputs that will later be used as parameters to OS commands, scripts, and database queries. It is particularly important for content that will be permanently stored somewhere. Users should not be able to create message content that could cause another user to load an undesireable page or undesireable content when the user's message is retrieved.<br>
|
||||
XSS can also occur when unvalidated user input is used in an HTTP response. In a reflected XSS attack, an attacker can craft a URL with the attack script and post it to another website, email it, or otherwise get a victim to click on it.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b></p>
|
||||
For this exercise, you will perform stored and reflected XSS attacks. You will also implement code changes in the web application to defeat these attacks.
|
||||
<br>
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> Denial of Service from Multiple Logins</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Denial of service attacks are a major issue in web applications. If the end user cannot conduct business or perform the service offered by the web application, then both time and money is wasted.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
This site allows a user to login multiple times. This site has a database connection pool that allows 2 connections. You must obtain a list of valid users and create a total of 3 logins.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Peform Basic Encoding</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Different encoding schemes can be used in web applications for different reasons.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
This lesson will familiarize the user with different encoding schemes.
|
@ -0,0 +1,10 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Bypass Fail Open Authentication </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
This lesson presents the basics for understanding the "fail open" condition regarding authentication. The security term, “fail open” describes a behavior of a verification mechanism. This is when an error (i.e. unexpected exception) occurs during a verification method causing that method to evaluate to true. This is especially dangerous during login. <br>
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to bypass the authentication check.
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Exploit Forced Browsing</p>
|
||||
</div>
|
||||
<!-- Start Instructions -->
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
How to Exploit Forced Browsing
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
This lesson needs a creator!
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Exploit the Forgot Password Page</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Web applications frequently provide their users the ability to retrieve a forgotten password. Unfortunately, most web applications fail to implement the mechanism properly. The information required to verify the integrity of the user is often overly simplistic.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
Users can retrieve their password if they can answer the secret question properly. There is no lock-out mechanism on this 'Forgot Password' page. Your username is 'webgoat' and your favorite color is 'red'. The goal is to retrieve the password of another user.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Exploit Hidden Fields </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Developers will use hidden fields for tracking, login, pricing, etc.. information on a loaded page. While this is a convienent and easy mechanism for the developer, they often don't validate the information that is received from the hidden field. This lesson will teach the attacker to find and modify hidden fields to obtain a product for a price other than the price specified <br>
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to exploit a hidden field to obtain a product at an incorrect price.
|
@ -0,0 +1,11 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Discover Clues in the HTML </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Developers are notorious for leaving statements like FIXME's, Code Broken, Hack, etc... inside the source code. Review the source code for any comments denoting passowrds, backdoors, or something doesn't work right.
|
||||
<!-- Stop Instructions -->
|
||||
<br>
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to bypass the authentication check.
|
@ -0,0 +1,27 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> Http Basics </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
This lesson presents the basics for understanding the transfer of data between the browser and the web application.<br>
|
||||
<div align="Left">
|
||||
<p>
|
||||
<b>How HTTP works:</b>
|
||||
</p>
|
||||
All HTTP transactions follow the same general format. Each client request and server response has three parts: the request or response line, a header section, and the entity body. The client initiates a transaction as follows: <br>
|
||||
<br>
|
||||
The client contacts the server and sends a document request <br>
|
||||
</div>
|
||||
<br>
|
||||
<ul>GET /index.html?param=value HTTP/1.0</ul>
|
||||
Next, the client sends optional header information to inform the server of its configuration and the document formats it will accept.<br>
|
||||
<br>
|
||||
<ul>User-Agent: Mozilla/4.06 Accept: image/gif,image/jpeg, */*</ul>
|
||||
After sending the request and headers, the client may send additional data. This data is mostly used by CGI programs using the POST method.<br>
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Enter your name in the input field below and press "go" to submit. The server will accept the request, reverse the input, and display it back to the user, illustrating the basics of handling an HTTP request.
|
||||
<br/><br/>
|
||||
The user should become familiar with the features of WebGoat by manipulating the above
|
||||
buttons to view hints, show the HTTP request parameters, the HTTP request cookies, and the Java source code.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> HttpOnly Test</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
To help mitigate the cross site scripting threat, Microsoft has introduced a new cookie attribute entitled 'HttpOnly.' If this flag is set, then the browser should not allow client-side script to access the cookie. Since the attribute is relatively new, several browsers neglect to handle the new attribute properly.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The purpose of this lesson is to test whether your browser supports the HTTPOnly cookie flag. Note the value of the unique2u cookie. If your browser supports HTTPOnly, and you enable it for a cookie, client side code should NOT be able to read OR write to that cookie, but the browser can still send its value to the server. Some browsers only prevent client side read access, but don't prevent write access.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,10 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Bypass Client Side JavaScript Validation </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Client-side validation should not be considered a secure means of validating parameters. These validation only help reduce the amount of server processing time for normal users who do not know the format of required input. Attackers can bypass these mechanisms easily in various ways. Any client-side validation should be duplicated on the server side. This will greatly reduce the likelyhood of insecure parameter values being used in the application.
|
||||
<!-- Stop Instructions -->
|
||||
<br>
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
For this exercise, the web site requires that you follow certain rules when you fill out a form. The user should be able to break those rules, and send the website input that it wasn't expecting. <br>
|
@ -0,0 +1,17 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> </p>
|
||||
</div>
|
||||
<!-- Start Instructions -->
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<p><b>Standards Addressed:</b> </p>
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
<p><b>Specific Objectives:</b> </p>
|
||||
<p><b>Required Materials:</b> </p>
|
||||
<p><b>Anticipatory Set (Lead-In):</b> </p>
|
||||
<p><b>Step-By-Step Procedures:</b> </p>
|
||||
<p><b>Plan For Independent Practice:</b> </p>
|
||||
<p><b>Closure (Reflect Anticipatory Set):</b> </p>
|
||||
<p><b>Assessment Based On Objectives:</b> </p>
|
||||
<p><b>Extensions (For Gifted Students):</b> </p>
|
||||
<p><b>Possible Connections To Other Subjects:</b> </p>
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,16 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Parameter Injection </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Parameter injection attacks represent a serious threat to any parameter-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack. <br>
|
||||
<br>
|
||||
Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This lesson will show the student several examples of parameter injection.<br>
|
||||
<br>
|
||||
It is always good practice to sanitize all input data, especially data that will used in OS command, scripts, and database queries.<br>
|
||||
<!-- Stop Instructions -->
|
||||
<br>
|
||||
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to execute any command on the hosting OS.
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Bypass a Path Based Access Control Scheme </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
In a path based access control scheme, an attacker can traverse a path by providing relative path information. Therefore an attacker can use relative paths to access files that normally are not directly accessible by anyone, or would otherwise be denied if requested directly.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to access a file that is not in the listed directory.
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title: </b>How to Perform Reflected Cross Site Scripting (XSS)</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
It is always a good practice to validate all input on the server side. XSS can occur when unvalidated user input is used in an HTTP response. In a reflected XSS attack, an attacker can craft a URL with the attack script and post it to another website, email it, or otherwise get a victim to click on it.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
For this exercise, your mission is to come up with some input containing a script. You have to try to get this page to reflect that input back to your browser, which will execute the script and do something bad.
|
@ -0,0 +1,11 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title: </b>How to Force Browser Web Resources</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
Applications will often have an adminstrative interface that allows privileged users access to functionality that normal users shouldn't see. The application server will often have an admin interface as well.
|
||||
<p><b>Standards Addressed:</b> </p>
|
||||
<p><b>General Goal(s):</b>
|
||||
<!-- Start Instructions -->
|
||||
Try to access the administrative interface for WebGoat. You may also try to access the administrative interface for Tomcat. The Tomcat admin interface can be accessed via a URL (/admin) and will not count towards the completion of this lesson.
|
||||
<!-- Stop Instructions -->
|
||||
</p>
|
@ -0,0 +1,15 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> Role Based Access Control</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
In role-based access control scheme, a role represents a set of access permissions and privileges. A user can be assigned one or more roles. A role-based access control normally consists of two parts: role permission management and role assignment. A broken role-based access control scheme might allow a user to perform accesses that are not allowed by his/her assigned roles, or somehow obtain unauthorized roles.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
Your goal is to explore the access control rules that govern this site. Each role has permission to certain resources (A-F). Each user is assigned one or more roles. Only the user with the [Admin] role should have access to the 'F' resources. In a successful attack, a user doesn't have the [Admin] role can access resource F.
|
||||
<p><b>Lesson Resources:</b> </p>
|
||||
<a href="lessons/RoleBasedAccessControl/images/orgChart.jpg" onclick="makeWindow(this.href, 'Org Chart');return false;" target="orgChartWin">Org Chart</a>
|
||||
<br>
|
||||
<a href="lessons/RoleBasedAccessControl/images/accessControl.jpg" onclick="makeWindow(this.href, 'Access Control Matrix');return false;" target="accessControlWin">Access Control Matrix</a>
|
||||
<br>
|
||||
<a href="lessons/RoleBasedAccessControl/images/dbSchema.jpg" onclick="makeWindow(this.href, 'Access Control Matrix');return false;" target="accessControlWin">Database Schema</a>
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Create a SOAP Request</p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Web Services communicate through the use of SOAP requests. These requests are submitted to a web service in an attempt to execute a function listed in the web service definition language (WSDL). Lets learn something about WSDL files. Check out WebGoats web service description language (WSDL) file.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
Try connecting to the WSDL with a browser or Web Service tool. The URL for the web service is: http://localhost/WebGoat/services/SoapRequest The WSDL can usually be viewed by adding a ?WSDL on the end of the web service request.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,14 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Numeric SQL Injection </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.
|
||||
<br>
|
||||
Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This lesson will show the student several examples of SQL injection.<br>
|
||||
<br>
|
||||
It is always good practice to sanitize all input data, especially data that will used in OS command, scripts, and database queiries.<br>
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The form below allows a user to view weather data. Try to inject an SQL string that results in all the weather data being displayed.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,14 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform String SQL Injection </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.
|
||||
<br>
|
||||
Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This lesson will show the student several examples of SQL injection.<br>
|
||||
<br>
|
||||
It is always good practice to sanitize all input data, especially data that will used in OS command, scripts, and database queiries.<br>
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The form below allows a user to view their credit card numbers. Try to inject an SQL string that results in all the credit card numbers being displayed. Try the user name of 'Smith'.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Stored Cross Site Scripting (XSS) </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
It is always a good practice to scrub all inputs, especially those inputs that will later be used as parameters to OS commands, scripts, and database queries. It is particularly important for content that will be permanently stored somewhere. Users should not be able to create message content that could cause another user to load an undesireable page or undesireable content when the user's message is retrieved.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to add message content that cause another user to load an undesireable page or content.
|
@ -0,0 +1,22 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
|
||||
<html>
|
||||
<head>
|
||||
|
||||
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
|
||||
<title>Lesson Plan</title>
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Exploit Thread Safety Problems </p>
|
||||
</div>
|
||||
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
Web applications can handle many HTTP requests simultaneously. Developers often use variables that are not thread safe. Thread safety means that the fields of an object or class always maintain a valid state when used concurrently by multiple threads. It is often possible to exploit a concurrency bug by loading the same page as another user at the exact same time. Because all threads share the same method area, and the method area is where all class variables are stored, multiple threads can attempt to use the same class variables concurrently. <br>
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to exploit the concurrency error in the web application and view login information for another user that is attempting the same function at the same time. <b>This will require the use of two browsers</b>.
|
||||
<br>
|
||||
</body>
|
||||
</html>
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Perform Cross Site Trace Attacks </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
It is always a good practice to scrub all inputs, especially those inputs that will later be used as parameters to OS commands, scripts, and database queries. It is particularly important for content that will be permanently stored somewhere. Users should not be able to create message content that could cause another user to load an undesireable page or undesireable content when the user's message is retrieved.
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
Tomcat is configured to support the HTTP TRACE command. Your goal is to perform a Cross Site Trace (XST) attack.
|
||||
<!-- Stop Instructions -->
|
@ -0,0 +1,9 @@
|
||||
<div align="Center">
|
||||
<p><b>Lesson Plan Title:</b> How to Exploit Unchecked Email </p>
|
||||
</div>
|
||||
<p><b>Concept / Topic To Teach:</b> </p>
|
||||
<!-- Start Instructions -->
|
||||
It is always a good practice to validate all inputs. Most sites allow a non-authenticated users to send email to a 'friend'. This is a great mechanisms for spammers to send out email using your corporate mail server.
|
||||
<!-- Stop Instructions -->
|
||||
<p><b>General Goal(s):</b> </p>
|
||||
The user should be able to send and obnoxious email message.
|