Minor Bugfixes

git-svn-id: http://webgoat.googlecode.com/svn/trunk@338 4033779f-a91e-0410-96ef-6bf7bf53c507
This commit is contained in:
wirth.marcel 2008-04-14 13:28:25 +00:00
parent 80d07fb62c
commit e2ca7f9a33
11 changed files with 29 additions and 29 deletions

View File

@ -265,7 +265,6 @@ public class SQLInjection extends GoatHillsFinancial
} }
public String getLessonSolutionFileName(WebSession s) { public String getLessonSolutionFileName(WebSession s) {
System.out.println("SOLUTION!!!");
String solutionFileName = null; String solutionFileName = null;
String stage = getStage(s); String stage = getStage(s);
solutionFileName = "/lesson_solutions/Lab SQL Injection/Lab " + stage + ".html"; solutionFileName = "/lesson_solutions/Lab SQL Injection/Lab " + stage + ".html";

View File

@ -35,10 +35,10 @@ First use any person from the list and see what you get. After doing this you
can search for a specific person in Firebug. Make sure you find the hidden table with can search for a specific person in Firebug. Make sure you find the hidden table with
the information, including the salary and so on. In the same table you will find the information, including the salary and so on. In the same table you will find
Neville. Neville.
<center>
<img src="/WebGoat/lesson_solutions/ClientSideFiltering_files/clientside_firebug.jpg" alt="Clientside Filtering" /> <img src="/WebGoat/lesson_solutions/ClientSideFiltering_files/clientside_firebug.jpg" alt="Clientside Filtering" /><br>
<font size="2"><b>Inspect HTML on Firebug</b></font> <font size="2"><b>Inspect HTML on Firebug</b></font>
</center>
<p> <p>
Now write the salary into the text edit box and submit your answer! Now write the salary into the text edit box and submit your answer!
</p> </p>

View File

@ -38,10 +38,11 @@ Now enter a character in the coupon code field. The Javascript gets executed
but stops at the breakpoint. On the right side you see the parameters but stops at the breakpoint. On the right side you see the parameters
and there values. Now use the step over symbol or F10. Now you can read and there values. Now use the step over symbol or F10. Now you can read
the clear text of decrypted: the clear text of decrypted:
<center> <br><br>
<img src="/WebGoat/lesson_solutions/ClientSideValidation_files/ClientSideValidation_stage1.png" width=450px alt="Stage 1" /> <img src="/WebGoat/lesson_solutions/ClientSideValidation_files/ClientSideValidation_stage1.png" width=450px alt="Stage 1" />
<b>Figure 1 Firebug in action</b> <br>
</center> <b><font size="2">Figure 1 Firebug in action</font></b>
<p> <p>
Now that you know the coupon name enter it in the coupon field, purchase something Now that you know the coupon name enter it in the coupon field, purchase something
and you are done. and you are done.

View File

@ -33,7 +33,7 @@ to the Tomcat Setup in the Introduction section.</p>
is free: <a href="http://www.wireshark.org/"> Wireshark</a>. Make sure is free: <a href="http://www.wireshark.org/"> Wireshark</a>. Make sure
you are capturing on the right interface. Click on you are capturing on the right interface. Click on
the submit button ans stop the capturing. Now analyze the captured data.</p> the submit button ans stop the capturing. Now analyze the captured data.</p>
<div align="center"> <div align="left">
<img src="lesson_solutions/InsecureLogin_files/wireshark1.png"><br> <img src="lesson_solutions/InsecureLogin_files/wireshark1.png"><br>
<font size="2"> <b>Figure 1: Sniffed Traffic</b></font> <font size="2"> <b>Figure 1: Sniffed Traffic</b></font>
</div> </div>

View File

@ -35,9 +35,9 @@ deletes employees. Of course you could just guess
it because it has a really logical name. it because it has a really logical name.
But we will look it up. So your first step is to log in as John with john as But we will look it up. So your first step is to log in as John with john as
password. Use WebScarab to intercept the delete request. password. Use WebScarab to intercept the delete request.
<center>
<img src="/WebGoat/lesson_solutions/Lab Access Control/images/access_control_stage1.png" width=450px alt="deleteAction" /> <img src="/WebGoat/lesson_solutions/Lab Access Control/images/access_control_stage1.png" width=450px alt="deleteAction" />
</center>
As you can see the delete action is called DeleteProfile. As you can see the delete action is called DeleteProfile.
Now log in as Tom. Click in the list on his name and make sure WebScarab Now log in as Tom. Click in the list on his name and make sure WebScarab
will intercept the next request. Click on a button, for example the will intercept the next request. Click on a button, for example the

View File

@ -37,10 +37,10 @@ of another employee!
</p> </p>
<p> <p>
Log in as Tom with tom as password. Click on Tom's name in the list and make sure Log in as Tom with tom as password. Click on Tom's name in the list and make sure
webscarab will intercept the next request. Change the employee_id for example to 101. webscarab will intercept the next request. Change the employee_id for example to 101.<br><br>
<center>
<img src="/WebGoat/lesson_solutions/Lab Access Control/images/access_control_stage1.png" width=450px alt="deleteAction" /> <img src="/WebGoat/lesson_solutions/Lab Access Control/images/access_control_stage1.png" width=450px alt="deleteAction" />
</center>
</body> </body>
</html> </html>

View File

@ -23,9 +23,9 @@ Now should appear Tom's Profile. Click on the 'Edit Profile' Button and try an X
For example: &lt;script&gt;alert("Got Ya");&lt;/script&gt;<br/> For example: &lt;script&gt;alert("Got Ya");&lt;/script&gt;<br/>
Click on the UpdateProfile Button and Log out.</p><p> Click on the UpdateProfile Button and Log out.</p><p>
<p> <p>
<center>
<img src="/WebGoat/lesson_solutions/Lab XSS/images/stored_xss.png" width=450px alt="stored_xss.png" /> <img src="/WebGoat/lesson_solutions/Lab XSS/images/stored_xss.png" width=450px alt="stored_xss.png" />
</center>
<p> <p>
Now log in as Jerry with jerry as password. Select from the the list the profile of tom and hit the Now log in as Jerry with jerry as password. Select from the the list the profile of tom and hit the
ViewProfile Button. Congratulation! You have completed the lesson. ViewProfile Button. Congratulation! You have completed the lesson.

View File

@ -33,13 +33,13 @@ works. In the second you have to break the strong authentication.
<b>Stage 1</b><br> <b>Stage 1</b><br>
This stage should be rather straight forward. Give in as name Jane This stage should be rather straight forward. Give in as name Jane
and as password tarzan. </p> and as password tarzan. </p>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src="lesson_solutions/MultiLevelLogin1_files/login.png"><br> <img src="lesson_solutions/MultiLevelLogin1_files/login.png"><br>
<b>Figure 1: Login Screen</b> <b>Figure 1: Login Screen</b>
</font></div><br> </font></div><br>
Afthr clicking on the submit button Afthr clicking on the submit button
you will be asked for the TAN. <br><br> you will be asked for the TAN. <br><br>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src="lesson_solutions/MultiLevelLogin1_files/tan.png"><br> <img src="lesson_solutions/MultiLevelLogin1_files/tan.png"><br>
<b>Figure 2: TAN Screen</b> <b>Figure 2: TAN Screen</b>
</font></div> </font></div>
@ -54,13 +54,13 @@ Now you will be asked for a TAN. Unfortunately you have only a already
used TAN from the victim. Fill in the TAN you have and make sure that WebScarab used TAN from the victim. Fill in the TAN you have and make sure that WebScarab
will intercept the next request. Hit the submit button and change the hidden_tan will intercept the next request. Hit the submit button and change the hidden_tan
value to 1. </p> value to 1. </p>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src="lesson_solutions/MultiLevelLogin1_files/webscarab.png"><br> <img src="lesson_solutions/MultiLevelLogin1_files/webscarab.png"><br>
<b>Figure 3: Manipulation Of The Hidden Field With WebScarab</b> <b>Figure 3: Manipulation Of The Hidden Field With WebScarab</b>
</font></div><br><br> </font></div><br><br>
Congratulations you are logged in as Jane.<br><br> Congratulations you are logged in as Jane.<br><br>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src="lesson_solutions/MultiLevelLogin1_files/success.png"><br> <img src="lesson_solutions/MultiLevelLogin1_files/success.png"><br>
<b>Figure 4: Manipulation Of The Hidden Field With WebScarab</b> <b>Figure 4: Manipulation Of The Hidden Field With WebScarab</b>
</font></div> </font></div>

View File

@ -34,7 +34,7 @@ Log in as Joe with password banana. Now make sure the next request will be inter
by WebScarab. Fill in the TAN you are asked for and hit the submit button. by WebScarab. Fill in the TAN you are asked for and hit the submit button.
Change now the hidden_user value from Joe to Jane and you are logged in Change now the hidden_user value from Joe to Jane and you are logged in
as Jane. as Jane.
<div align="center"> <div align="left">
<img src="lesson_solutions/MultiLevelLogin2_files/success.png"><br> <img src="lesson_solutions/MultiLevelLogin2_files/success.png"><br>
<font size="2"><b>Figure 1: Manipulation Of The Hidden Field With WebScarab</b></font> <font size="2"><b>Figure 1: Manipulation Of The Hidden Field With WebScarab</b></font>
</div> </div>

View File

@ -51,7 +51,7 @@ the link. Of course can WHATEVER be replaced by any other string.
The link should look similar to following:<br> The link should look similar to following:<br>
&lt;a href=http://localhost/WebGoat/attack?Screen=46&menu=320&SID=WHATEVER&gt; &lt;a href=http://localhost/WebGoat/attack?Screen=46&menu=320&SID=WHATEVER&gt;
</p> </p>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src='lesson_solutions/SessionFixation_files/sf_stage1.png'><br> <img src='lesson_solutions/SessionFixation_files/sf_stage1.png'><br>
<b>Figure 1: Phishing Mail</b> <b>Figure 1: Phishing Mail</b>
</font> </font>
@ -64,7 +64,7 @@ Point with the mouse on the link and you will notice the
SID in the status bar of your browser. This is the easiest SID in the status bar of your browser. This is the easiest
stage as you have only to click on the link 'Goat Hills Financial'. stage as you have only to click on the link 'Goat Hills Financial'.
</p> </p>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src='lesson_solutions/SessionFixation_files/sf_stage2.png'><br> <img src='lesson_solutions/SessionFixation_files/sf_stage2.png'><br>
<b>Figure 2: Received Phishing Mail</b> <b>Figure 2: Received Phishing Mail</b>
</font> </font>
@ -78,7 +78,7 @@ the URL is the SID visible. All
you have to do is to log in with your user name Jane you have to do is to log in with your user name Jane
and your password tarzan. and your password tarzan.
</p> </p>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src='lesson_solutions/SessionFixation_files/sf_stage3.png'><br> <img src='lesson_solutions/SessionFixation_files/sf_stage3.png'><br>
<b>Figure 3: Goat Hills Financial Login Screen</b> <b>Figure 3: Goat Hills Financial Login Screen</b>
</font> </font>
@ -98,7 +98,7 @@ Goat Hill Financial. Take a look at the URL and
you will see that your SID is NOVALIDSESSION. you will see that your SID is NOVALIDSESSION.
Change this string to the SID you have chosen Change this string to the SID you have chosen
at the beginning of this lesson and hit enter.</p> at the beginning of this lesson and hit enter.</p>
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src='lesson_solutions/SessionFixation_files/sf_stage4_1.png'><br> <img src='lesson_solutions/SessionFixation_files/sf_stage4_1.png'><br>
<b>Figure 4: Browser Address Bar Before Changes</b> <b>Figure 4: Browser Address Bar Before Changes</b>
<br><br> <br><br>
@ -109,7 +109,7 @@ at the beginning of this lesson and hit enter.</p>
<br><br> <br><br>
Congratulation! You are logged in as Jane Congratulation! You are logged in as Jane
and the lesson was successful. and the lesson was successful.
<div align="center"><font size="2"> <div align="left"><font size="2">
<img src='lesson_solutions/SessionFixation_files/sf_success.png'><br> <img src='lesson_solutions/SessionFixation_files/sf_success.png'><br>
<b>Figure 6: Successful Completion Of The Lesson</b> <b>Figure 6: Successful Completion Of The Lesson</b>
</font> </font>

View File

@ -637,7 +637,7 @@ query: SELECT * FROM weather_data WHERE station = 101<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-family:"Arial","sans-serif"'>Intercept the post request with WebScarab and replace 101 with 101 or 1=1!<o:p></o:p></span></p> <p class=MsoNormal><span style='font-family:"Arial","sans-serif"'>Intercept the post request with WebScarab and replace 101 with 101 or 1=1!<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-family:"Arial","sans-serif"'><o:p>&nbsp;</o:p></span></p> <p class=MsoNormal><span style='font-family:"Arial","sans-serif"'><o:p>&nbsp;</o:p></span></p>
<center>
<img src = "/WebGoat/lesson_solutions/SqlNumericInjection_files/numericinjection.png" width=350px> <img src = "/WebGoat/lesson_solutions/SqlNumericInjection_files/numericinjection.png" width=350px>
@ -647,13 +647,13 @@ field-begin'></span><span style='mso-spacerun:yes'>
style='mso-no-proof:yes'>1</span><!--[if supportFields]><span style='mso-element: style='mso-no-proof:yes'>1</span><!--[if supportFields]><span style='mso-element:
field-end'></span><![endif]--> Intercepted Request with WebScarab<span style='font-family: field-end'></span><![endif]--> Intercepted Request with WebScarab<span style='font-family:
"Arial","sans-serif"'><o:p></o:p></span></p> "Arial","sans-serif"'><o:p></o:p></span></p>
</center>
<br/> <br/>
<br/> <br/>
<p class=MsoNormal><span style='font-family:"Arial","sans-serif"'>As the SQL Statement is true for every station you get <p class=MsoNormal><span style='font-family:"Arial","sans-serif"'>As the SQL Statement is true for every station you get
a list of all stations:<o:p></o:p></span></p> a list of all stations:<o:p></o:p></span></p>
<center>
<img src = "/WebGoat/lesson_solutions/SqlNumericInjection_files/numericinjection_solved.png" width=350px> <img src = "/WebGoat/lesson_solutions/SqlNumericInjection_files/numericinjection_solved.png" width=350px>
@ -663,7 +663,7 @@ field-begin'></span><span style='mso-spacerun:yes'>
style='mso-no-proof:yes'>2</span><!--[if supportFields]><span style='mso-element: style='mso-no-proof:yes'>2</span><!--[if supportFields]><span style='mso-element:
field-end'></span><![endif]--> All stations are visible<span style='font-family: field-end'></span><![endif]--> All stations are visible<span style='font-family:
"Arial","sans-serif"'><o:p></o:p></span></p> "Arial","sans-serif"'><o:p></o:p></span></p>
</center>
<p class=MsoNormal><o:p>&nbsp;</o:p></p> <p class=MsoNormal><o:p>&nbsp;</o:p></p>