Added Backdoors lesson
git-svn-id: http://webgoat.googlecode.com/svn/trunk@47 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
		
							
								
								
									
										21
									
								
								 webgoat/main/project/WebContent/lesson_plans/BackDoors.html
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								 webgoat/main/project/WebContent/lesson_plans/BackDoors.html
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,21 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b> How to Create Database Back Door Attacks.</p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
| How to Create Database Back Door Attacks. | ||||
|  <br>  | ||||
| <div align="Left">  | ||||
| <p> | ||||
| <b>How the attacks works:</b> | ||||
| </p> | ||||
| Database are used usually as a backend for web applications. Also it is used as a media of storage. It can also | ||||
| be used as a place to store a malacious activity such as a trigger. A trigger is called by the database management | ||||
| system upon the execution of another database operation like insert, select, update or delete. An attacker for example | ||||
| can create a trigger that would set his email address instead of every new user's email address. | ||||
| </div> | ||||
| <p><b>General Goal(s):</b> </p> | ||||
| <!-- Start Instructions --> | ||||
| * Your goal should be to learn how you can exploit a vulnerable query to create a trigger.<br> | ||||
| * You will not be able to actually create one in this lesson because the underlying database engine used with WebGoat doesn't support triggers.<br> | ||||
| <!-- Stop Instructions --> | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b> Cross Site Request Forgery. </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform Cross Site Request Forgery. </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b>DOM Injection. </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform DOM Injection Attack. </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b>Forced Browsing. </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform Forced Browsing Attacks. </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b> Http Splitting </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform Http Splitting </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b> Log Spoofing. </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform Log Spoofing. </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b> XML Injection Attacks. </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform XML Injection Attacks. </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
| @ -1,5 +1,5 @@ | ||||
| <div align="Center">  | ||||
| <p><b>Lesson Plan Title:</b> XPATH Injection Attacks. </p> | ||||
| <p><b>Lesson Plan Title:</b> How to Perform XPATH Injection Attacks. </p> | ||||
|  </div> | ||||
|   | ||||
| <p><b>Concept / Topic To Teach:</b> </p> | ||||
|  | ||||
		Reference in New Issue
	
	Block a user