Wireshark to useful tools added

git-svn-id: http://webgoat.googlecode.com/svn/trunk/webgoat@336 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
wirth.marcel 2008-04-14 09:24:12 +00:00
parent 42d4fd322d
commit c4b5bb0758
4 changed files with 33 additions and 23 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 94 KiB

View File

@ -1,7 +1,7 @@
<!-- Start Instructions -->
<h1>How To Work With WebGoat</h1>
<p>
Welcome to a short introduction of WebGoat.<br>
Welcome to a short introduction to WebGoat.<br>
Here you will learn how to use WebGoat and additional tools for the lessons.<br><br>
</p>
<h1>Environment Information</h1>
@ -23,15 +23,15 @@ in the Introduction section.</p>
<p>
Always read first the lessons plan. Then try to solve the lesson and if necessary,
use the hints. If you cannot solve the lesson using the hints, you may watch the
solution. Here every step is explained.</p>
solution. Every step is explained there.</p>
<h2>Read And Edit Parameters</h2>
<p>
To read and edit Parameters you need a proxy to intercept the HTTP request.
To read and edit Parameters you need a local proxy to intercept the HTTP request.
Here we use WebScarab. More informations to WebScarab you will get in the
Chapter "Useful Tools".
After installing WebScarab and making a proxy on localhost we can start.<br><br>
After installing WebScarab and using it as proxy on localhost we can start.<br><br>
<img src="/WebGoat/images/introduction/HowToUse_1.jpg"><br><br>
We have to select "intercept request" in the tab "Intercept". If we send a new HTTP request now, we get a new WebScarab window.<br><br>
We have to select "Intercept Request" in the tab "Intercept". If we send a HTTP request we get a new WebScarab window.<br><br>
<img src="/WebGoat/images/introduction/HowToUse_2.jpg"><br><br>
Here we can read and edit the sent parameter. After "Accept changes" the request will be sent to the server.
</p>
@ -39,6 +39,6 @@ Here we can read and edit the sent parameter. After "Accept changes" the request
<p>
Often it is not only necessary to change the value of parameters but to change the value of cookies. We use again WebScarab and intercept the request as explained in the last topic.<br><br>
<img src="/WebGoat/images/introduction/HowToUse_3.jpg"><br><br>
We again get the new window on sending a HTTP request. On the screenshot you see where we can find cookies and how to edit the values of them.
We get a new window on sending a HTTP request. On the screenshot you see where we can find cookies and how to edit the values of them.
</p>
<!-- Stop Instructions -->

View File

@ -1,32 +1,32 @@
<!-- Start Instructions -->
<h1>How To Configure Tomcat</h1><br><br>
<h2>Introduction</h2>
<p>WebGoat comes with a sane default setup for Tomcat. This page will explain the setup
and which further possibilites you have to setup Tomcat. This is just
<p>WebGoat comes with sane default configurations for Tomcat. This page will explain the configurations
and which further possibilities you have to configure Tomcat. This is just
a short description which should be enough in most cases. For more advanced tasks please
refer to the Tomcat documentation. Please note that all solutions
are written for the standard setup on port 80. If you use another configuration you have
to ajust the solution to your configuration.</p>
are written for the standard configurations on port 80. If you use another configurations you have
to adjust the solution to your configurations.</p>
<h2>The Standard Configuration</h2>
<p>There are two standard Tomcat setups. In this setups WebGoat is only reachable from within
<h2>The Standard Configurations</h2>
<p>There are two standard Tomcat configurations. In this configurations WebGoat is only reachable from within
the localhost.
Both are identically with the only difference
that one is running on port 80 and 443 (SSL) and the other on 8080 and 8443. In Linux you have
that in one tomcat is running on port 80 and 443 (SSL) and in the other tomcat is running on port 8080 and 8443. In Linux you have
to start WebGoat as root or with sudo if you want to run it on port 80 and
443.
As running software as root is dangerous we strongly advice to use
the port 8080 and 8443. In Windows you can
run WebGoat.bat to run it on port 80 and WebGoat_8080.bat to run it on port 8080. In Linux you
can use webgoat.sh and run it with webgoat.sh start80 or wegoat.sh start8080. The user in these
setups is guest with password guest
configurations is guest with password guest
</p>
<h2>Server Configurations</h2>
<p>
If you are a single user of WebGoat the standard setups should be
If you are a single user of WebGoat the standard configurations should be
enough but if you want to use WebGoat in laboratory or in class there
might be the need to change the configuration. Before changing
might be the need to change the configurations. Before changing
the configurations we recommend doing a backup of the files you change.
</p>
@ -54,13 +54,13 @@ In this example to port 8442:
<p>THIS MAKES IT POSSIBLE TO REALLY ATTACK YOUR SERVER! DO NOT DO THIS
UNTIL YOU KNOW WHAT YOU ARE DOING. THIS CONFIGURATION SHOULD BE ONLY USED IN
SAVE NETWORKS!</p>
<p>By its default configuration WebGoat is only
<p>By its default configurations WebGoat is only
reachable within the localhost. In a laboratory or a class
there is maybe the need of having a server and a few clients.
In this case it is possible to make WebGoat reachable.
</p>
<p>The reason why WebGoat is only reachable within the localhost is
the parameter address in the connectors in server_80.xml. It is set
the parameter address in the connectors for the non-SSL and SSL connection in server_80.xml. It is set
to 127.0.0.1. The applications only listens on the port of this address for
incoming connections if it is set. If you remove this parameter the server listens on all IPs on the
specific port.</p>
@ -79,10 +79,10 @@ only discussed the whitebox approach. You have to add following lines to the Hos
</pre>
<p>In this case only localhost, ip1 and ip2 are permitted to connect.</p>
<h2>Users</h2>
<h2>Users Configuration</h2>
<p>
Usually using WebGoat you just use the user guest with the password guest.
But maybe in laboratory you have made a configuration with one server and a lot of
But maybe in laboratory you have made a setup with one server and a lot of
clients. In this case you might want to have a user for every client
and you have to alter tomcat-users.xml
in tomcat/conf as the users are stored there. <b>We recommend not to use real passwords

View File

@ -6,8 +6,8 @@ Here we want to present you some useful tools. You will need WebScarab
to solve most of the lessons. </p>
<h2>WebScarab:</h2>
<p>
As WebGoat, WebScarab is a part of OWASP.
WebScarab is a framework for analysing applications that
Like WebGoat, WebScarab is a part of OWASP.
WebScarab is a framework for analyzing applications that
communicate using the HTTP and HTTPS protocols. Because WebScarab
operates as an intercepting proxy, we can review and modify requests
and responses.<br><br>
@ -20,11 +20,21 @@ Firebug is an add-on for the Firefox browser. We can use it to inspect, edit and
<img src="/WebGoat/images/introduction/firebug.jpg"><br><br>
Webpage:<a href="http://www.getfirebug.com" target="_blank">http://www.getfirebug.com</a>
<br><br>
<b>IEWatch:</b><br><br>
<h2>IEWatch:</h2>
<p>
IEWatch is a tool to analyse HTTP and HTML for users of the Internet Explorer.<br><br>
<img src="/WebGoat/images/introduction/iewatch.jpg"><br><br>
Webpage:<a href="http://www.iewatch.com" target="_blank">http://www.iewatch.com</a>
</p>
<h2>Wireshark</h2>
<p>
Wireshark is a network protocol analyzer. You can sniff network traffic and gather useful
informations this way.<br><br>
<img src="/WebGoat/images/introduction/wireshark.png"><br><br>
Webpage:<a href="http://www.wireshark.org" target="_blank">http://www.wireshark.org</a>
</p>
<h2>Scanner:</h2>
<p>
There exist a lot of vulnerability scanner for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Here the links to two open source scanner. <br><br>