SlideShare a Scribd company logo
1© Copyright 2014 Coveros, Inc. All rights reserved.
Web Application Security Testing:
Kali Linux Is the Way to Go
Gene Gotimer, Senior Architect
gene.gotimer@coveros.com
2© Copyright 2014 Coveros, Inc. All rights reserved.
 Coveros helps organizations accelerate the delivery of
business value through secure, reliable software
About Coveros
3© Copyright 2014 Coveros, Inc. All rights reserved.
Kali Linux – www.kali.org
 Penetration Testing and Security Auditing Linux
distribution
 New generation of BackTrack Linux
 Debian-based
 Many install options:
– i386, x86_64, ARM
– Android devices
– ISO, VMWare, AMI
– Installed, virtual,
dual boot, live USB
– Metapackages
4© Copyright 2014 Coveros, Inc. All rights reserved.
Not for general use!
 Single user
 Default user is root
– Many of the tools need root anyway
– Live images use toor as default root password
 Not recommended for Linux beginners
– It is a pen testing and security auditing tool
– Easy to mess up the system as root
– Easy to attack your organization from within
 even unintentionally…
5© Copyright 2014 Coveros, Inc. All rights reserved.
6© Copyright 2014 Coveros, Inc. All rights reserved.
Tool Categories
 Information Gathering
 Vulnerability Analysis
 Web Applications
 Password Attacks
 Wireless Attacks
 Exploitation Tools
 Sniffing/Spoofing
 Maintaining Access
 Reverse Engineering
 Stress Testing
 Hardware Hacking
 Forensics
 Reporting Tools
7© Copyright 2014 Coveros, Inc. All rights reserved.
8© Copyright 2014 Coveros, Inc. All rights reserved.
Top 10 Security Tools
 Aircrack-ng
– wireless password cracking
 Burp Suite
– web application proxy and security testing
 THC-Hydra
– network password cracker
 John the Ripper
– Unix and Windows password cracker
 Maltego
– intelligence and forensics
9© Copyright 2014 Coveros, Inc. All rights reserved.
Top 10 Security Tools
 Metasploit Framework
– pentesting and exploitation tool
 Nmap
– network discovery
 OWASP Zed Attack Proxy
– web application scanner and proxy
 sqlmap
– SQL injection detection and exploitation
 Wireshark
– network protocol analyzer
10© Copyright 2014 Coveros, Inc. All rights reserved.
Many more tools
 Hundreds of tools
 Supporting software
– GUI front ends
 Greenbone for OpenVAS
 Armitage for Metaploit
 Zenmap for Nmap
– updaters
 Metasploit
 OpenVAS
 Tools are integrated
– OpenVAS runs Nikto2, Wapiti, Nmap, Arachni
– Metasploit can run OpenVAS
11© Copyright 2014 Coveros, Inc. All rights reserved.
Ways to Use Kali Linux
 Professional Penetration Testing
 Pen test Tool Suite
– Install on a USB drive
– Carry to the client site
– All tools you need are available
 Forensic Information Gathering
– Live boot into forensic mode
– Doesn’t touch internal hard drive
– No auto mount of removable media
 Password Recovery
12© Copyright 2014 Coveros, Inc. All rights reserved.
Ways for non-Pentesters to Use Kali Linux
 Tool catalog
– Browse menus to find tools in any category
 Pre-installed tools
– Try a tool to see if it meets your needs
– Compare tools
 Occasional security tests
– Don’t have time/resources to maintain security testing
environment
 Exploitation software
– Demonstrate vulnerabilities
13© Copyright 2014 Coveros, Inc. All rights reserved.
 VM with very vulnerable apps
 Do not run on production network!
 Training apps
– WebGoat, Damn Vulnerable Web Application
 Realistic, intentionally vulnerable apps
 Old, vulnerable versions of real apps
 Demo apps
 http://code.google.com/p/owaspbwa/
OWASP Broken Web Applications
14© Copyright 2014 Coveros, Inc. All rights reserved.
 Discover hosts on a network
 Find open ports/services on a host
 Fingerprint OS
 Identify service versions
Network Scanners
15© Copyright 2014 Coveros, Inc. All rights reserved.
 Network scanner
– Inventory
– Discovery
– Monitor
 Not a vulnerability scanner
 Variety of scan depths
 Runs in seconds to minutes
Nmap / zenmap
16© Copyright 2014 Coveros, Inc. All rights reserved.
17© Copyright 2014 Coveros, Inc. All rights reserved.
18© Copyright 2014 Coveros, Inc. All rights reserved.
19© Copyright 2014 Coveros, Inc. All rights reserved.
20© Copyright 2014 Coveros, Inc. All rights reserved.
21© Copyright 2014 Coveros, Inc. All rights reserved.
 Web server scanner
– Looks at the server software, e.g., Apache, for
misconfigurations
 Web application scanner
– Looks at the application for vulnerabilities
 XSS
 SQLi
 Command execution
– Fuzzing
 Typically black-box scans
Web Vulnerability Scanner
22© Copyright 2014 Coveros, Inc. All rights reserved.
Nikto2
 Web server scanner
– Not a web application scanner
– Looks at Apache
 command-line tool
– nikto –h 192.168.56.101
 Runs in seconds to minutes, as much as a few
hours
 Report is text-only to the screen
23© Copyright 2014 Coveros, Inc. All rights reserved.
24© Copyright 2014 Coveros, Inc. All rights reserved.
- Nikto v2.1.5
---------------------------------------------------------------------------
+ Target IP: 192.168.56.101
+ Target Hostname: 192.168.56.101
+ Target Port: 80
+ Start Time: 2014-03-01 14:40:40 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache/2.2.14 (Ubuntu) mod_mono/2.4.3 PHP/5.3.2-1ubuntu4.5 with
Suhosin-Patch proxy_html/3.0.1 mod_python/3.3.1 Python/2.6.5 mod_ssl/2.2.14
OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4 Perl/v5.10.1
+ Server leaks inodes via ETags, header found with file /, inode: 289297, size:
26711, mtime: 0x4e2b33fc8f300
+ The anti-clickjacking X-Frame-Options header is not present.
+ OSVDB-3268: /cgi-bin/: Directory indexing found.
+ IP address found in the 'location' header. The IP is "127.0.1.1".
+ OSVDB-630: IIS may reveal its internal or real IP in the Location header via
a request to the /images directory. The value is "http://127.0.1.1/images/".
+ Apache/2.2.14 appears to be outdated (current is at least Apache/2.2.22).
Apache 1.3.42 (final release) and 2.0.64 are also current.
+ mod_ssl/2.2.14 appears to be outdated (current is at least 2.8.31) (may
depend on server version)
+ mod_perl/2.0.4 appears to be outdated (current is at least 2.0.7)
+ mod_mono/2.4.3 appears to be outdated (current is at least 2.8)
Nikto2
25© Copyright 2014 Coveros, Inc. All rights reserved.
+ OpenSSL/0.9.8k appears to be outdated (current is at least 1.0.1c). OpenSSL
0.9.8r is also current.
+ Python/2.6.5 appears to be outdated (current is at least 2.7.3)
+ PHP/5.3.2-1ubuntu4.5 appears to be outdated (current is at least 5.4.4)
+ Perl/v5.10.1 appears to be outdated (current is at least v5.14.2)
+ proxy_html/3.0.1 appears to be outdated (current is at least 3.1.2)
+ mod_ssl/2.2.14 OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4
Perl/v5.10.1 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer
overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082,
OSVDB-756.
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to
XST
+ Retrieved x-powered-by header: PHP/5.3.2-1ubuntu4.5
+ Cookie phpbb2owaspbwa_data created without the httponly flag
+ Cookie phpbb2owaspbwa_sid created without the httponly flag
+ OSVDB-3092: /phpmyadmin/changelog.php: phpMyAdmin is for managing MySQL
databases, and should be protected or limited to authorized hosts.
+ OSVDB-3268: /test/: Directory indexing found.
+ OSVDB-3092: /test/: This might be interesting...
+ OSVDB-3092: /cgi-bin/: This might be interesting... possibly a system shell
found.
+ OSVDB-3268: /icons/: Directory indexing found.
Nikto2
26© Copyright 2014 Coveros, Inc. All rights reserved.
+ OSVDB-3268: /images/: Directory indexing found.
+ OSVDB-3268: /images/?pattern=/etc/*&sort=name: Directory indexing found.
+ Cookie phpMyAdmin created without the httponly flag
+ OSVDB-3233: /icons/README: Apache default file found.
+ Uncommon header 'x-pingback' found, with contents:
http://192.168.56.102/wordpress/xmlrpc.php
+ /wordpress/: A Wordpress installation was found.
+ /phpmyadmin/: phpMyAdmin directory found
+ 6544 items checked: 1 error(s) and 32 item(s) reported on remote host
+ End Time: 2014-03-01 14:41:23 (GMT-5) (43 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Nikto2
27© Copyright 2014 Coveros, Inc. All rights reserved.
Wapiti
 Web application scanner
 Fuzzer
 command-line tool
– wapiti http://192.168.56.101/vicnum/
 Runs in minutes to a few hours
– can get “stuck” on a URL
 Report is text-only to the screen
28© Copyright 2014 Coveros, Inc. All rights reserved.
29© Copyright 2014 Coveros, Inc. All rights reserved.
30© Copyright 2014 Coveros, Inc. All rights reserved.
31© Copyright 2014 Coveros, Inc. All rights reserved.
skipfish
 Web application scanner
 Fuzzer, very fast with dictionaries
 command-line tool
– touch wordlist.wl
– skipfish –o /root/bsc-20140604 
–S /usr/share/skipfish/dictionaries/minimal.wl 
–W wordlist.wl http://192.168.56.101/
 Runs in minutes to hours
– Can be time boxed (-k duration in h:m:s)
 Report is HTML
32© Copyright 2014 Coveros, Inc. All rights reserved.
33© Copyright 2014 Coveros, Inc. All rights reserved.
34© Copyright 2014 Coveros, Inc. All rights reserved.
35© Copyright 2014 Coveros, Inc. All rights reserved.
 Acts as a “man-in-the-middle”
– inspect requests and responses
– modify in-flight
Intercepting Proxy
WebProxy
Web
Browser
Web
Server
36© Copyright 2014 Coveros, Inc. All rights reserved.
OWASP Zed Attack Proxy
 Web application scanner and proxy
 Intercepting proxy
 Fuzzer
 Scanner
 Spider
 GUI interface
 Can generate XML and HTML reports
37© Copyright 2014 Coveros, Inc. All rights reserved.
38© Copyright 2014 Coveros, Inc. All rights reserved.
39© Copyright 2014 Coveros, Inc. All rights reserved.
40© Copyright 2014 Coveros, Inc. All rights reserved.
 Not just find vulnerabilities, exploit them
 Could be a true hacker tool
 Can be used to prove vulnerability is real and can
be exploited
Exploitation Tools
41© Copyright 2014 Coveros, Inc. All rights reserved.
 Metasploit Framework– prove vulnerabilities
– choose and configure exploit
– scan target
– choose and configure payload
– choose encoding technique
– execute exploit
 Armitage– Graphical front end
– launch scan
– suggest exploits
Metasploit / Armitage
42© Copyright 2014 Coveros, Inc. All rights reserved.
43© Copyright 2014 Coveros, Inc. All rights reserved.
44© Copyright 2014 Coveros, Inc. All rights reserved.
45© Copyright 2014 Coveros, Inc. All rights reserved.
46© Copyright 2014 Coveros, Inc. All rights reserved.
 Audit systems
 Track vulnerabilities
 Mark false positives
 Not good one-time scan tools
Vulnerability Management
47© Copyright 2014 Coveros, Inc. All rights reserved.
OpenVAS / Greenbone
 Open-source fork of Nessus
 System vulnerability scanner and manager
 Daily feeds of Network Vulnerability Tests (NVTs)
 Scans scheduled or on-demand
 View results
– by host or by scan
– deltas
 Overrides
– false positives
– backported fixes
48© Copyright 2014 Coveros, Inc. All rights reserved.
49© Copyright 2014 Coveros, Inc. All rights reserved.
50© Copyright 2014 Coveros, Inc. All rights reserved.
51© Copyright 2014 Coveros, Inc. All rights reserved.
52© Copyright 2014 Coveros, Inc. All rights reserved.
 Kali Linux is useful for:
– finding security tools
– trying security tools
– using security tools
www.kali.org
Summary
53© Copyright 2014 Coveros, Inc. All rights reserved.
 Coveros is an ICAgile Member Training Organization (MTO)
with courses accredited by ICAgile.
 By participating in this session, you have started upon the
path to earning internationally recognized Agile Professional
Certifications. This course covers 4 of the more than 400
learning objectives from the ICAgile Learning Roadmap.
 To claim your learning credits, navigate to www.icagile.com
and select link to claim ICAgile learning credits.
 You will need to register and provide the code for this
specific event: BSW14-WSTL
Congratulations!
54© Copyright 2014 Coveros, Inc. All rights reserved.
Gene Gotimer
gene.gotimer@coveros.com
www.coveros.com
@CoverosGene
Questions?

More Related Content

PDF
Tools kali
PPTX
Kali Linux - Falconer
PPTX
2016 TTL Security Gap Analysis with Kali Linux
PDF
(03 2013) guide to kali linux
PPTX
Kali Linux - CleveSec 2015
PPTX
Kali presentation
PPTX
Kali Linux - Falconer - ISS 2014
PPTX
Linux/Unix Night - (PEN) Testing Toolkits (English)
Tools kali
Kali Linux - Falconer
2016 TTL Security Gap Analysis with Kali Linux
(03 2013) guide to kali linux
Kali Linux - CleveSec 2015
Kali presentation
Kali Linux - Falconer - ISS 2014
Linux/Unix Night - (PEN) Testing Toolkits (English)

What's hot (18)

PPTX
Kali Linux
PDF
Hack Attack! An Introduction to Penetration Testing
PPTX
kali linux.pptx
PPTX
Kali Linux
PDF
Kali linux tutorial
PPTX
Kali linux summarised
PDF
penetration test using Kali linux ppt
PDF
BASIC OVERVIEW OF KALI LINUX
PPTX
kali linux
PPTX
Kali linux
ODP
Kali linux and some features [view in Full screen mode]
PPTX
Kali linux
PPTX
Kali linux
PPTX
Shamsa altayer 10bg kali linux
PPTX
kali linux Presentaion
PPTX
kali linux
PDF
penetration test using Kali linux seminar report
PPT
Backtrack os 5
Kali Linux
Hack Attack! An Introduction to Penetration Testing
kali linux.pptx
Kali Linux
Kali linux tutorial
Kali linux summarised
penetration test using Kali linux ppt
BASIC OVERVIEW OF KALI LINUX
kali linux
Kali linux
Kali linux and some features [view in Full screen mode]
Kali linux
Kali linux
Shamsa altayer 10bg kali linux
kali linux Presentaion
kali linux
penetration test using Kali linux seminar report
Backtrack os 5
Ad

Viewers also liked (12)

PPT
Security Measure
PPTX
Kali Linux Installation - VMware
PDF
Kali LinuxとMetasploitable2で遊ぼう
PPT
Threats, Vulnerabilities & Security measures in Linux
PPT
Web Application Security Testing
PDF
Hack wifi password using kali linux
PPT
Chapter 3 Feasibility analysis(lecture 4 & 5)
PDF
Gunadarma workshop security
PPT
How to Use Outstanding Visual Language in a Presentation – Part I
PDF
Kali Linux Manual
PPTX
Presentation security measure
PDF
Hype vs. Reality: The AI Explainer
Security Measure
Kali Linux Installation - VMware
Kali LinuxとMetasploitable2で遊ぼう
Threats, Vulnerabilities & Security measures in Linux
Web Application Security Testing
Hack wifi password using kali linux
Chapter 3 Feasibility analysis(lecture 4 & 5)
Gunadarma workshop security
How to Use Outstanding Visual Language in a Presentation – Part I
Kali Linux Manual
Presentation security measure
Hype vs. Reality: The AI Explainer
Ad

Similar to Web Application Security Testing: Kali Linux Is the Way to Go (20)

PDF
DOCX
Top 10 Kali Linux Iconic Tools for Cybersecurity Enthusiasts.docx
PDF
App armor structure
PDF
Infosecurity.be 2019: What are relevant open source security tools you should...
DOCX
Security Handbook
DOCX
unit 2 Intoduction to Tools and Platforms.docx
PDF
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
PDF
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
PDF
Pitfalls and limits of dynamic malware analysis
PDF
Securing your Rails application
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
Ceh v5 module 18 linux hacking
PPSX
20210906-Nessus-FundamentalInfoSec.ppsx
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PDF
Apache web-server-security
PDF
EMBA Firmware analysis - TROOPERS22
PDF
SOC-BlueTEam.pdf
Top 10 Kali Linux Iconic Tools for Cybersecurity Enthusiasts.docx
App armor structure
Infosecurity.be 2019: What are relevant open source security tools you should...
Security Handbook
unit 2 Intoduction to Tools and Platforms.docx
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
Pitfalls and limits of dynamic malware analysis
Securing your Rails application
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
FBI & Secret Service- Business Email Compromise Workshop
Ceh v5 module 18 linux hacking
20210906-Nessus-FundamentalInfoSec.ppsx
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Apache web-server-security
EMBA Firmware analysis - TROOPERS22
SOC-BlueTEam.pdf

More from Gene Gotimer (20)

PDF
Let's Do Bad Things to Unsecured Containers
PDF
Clean Your Cloud with Cloud Custodian slides
PDF
A Hands-on Intro to Containers- Nebraska.Code()
PDF
A Developer's Guide to Kubernetes Security
PDF
Fixing Git Catastrophes - Nebraska.Code()
PDF
KCDC- Keeping Secrets Out of Your Pipeline
PDF
How Fast Is My App? Performance Testing 101
PDF
A Developer’s Guide to Kubernetes Security
PDF
How I Learned to Stop Worrying and Love Legacy Code
PDF
Ten Ways To Doom Your DevOps
PPTX
Keeping Your Kubernetes Cluster Secure
PDF
Keeping your Kubernetes Cluster Secure
PDF
Explain DevOps To Me Like I’m Five: DevOps for Managers
PPTX
Keeping your Kubernetes Cluster Secure
PPTX
Creative Solutions to Already Solved Problems II
PPTX
Creative Solutions to Already Solved Problems
PDF
Get to Green: How to Safely Refactor Legacy Code
PDF
DevOps for Leadership
PDF
Pyramid Discussion: DevOps Adoption in Large, Slow Organizations
PPTX
A better faster pipeline for software delivery, even in the government
Let's Do Bad Things to Unsecured Containers
Clean Your Cloud with Cloud Custodian slides
A Hands-on Intro to Containers- Nebraska.Code()
A Developer's Guide to Kubernetes Security
Fixing Git Catastrophes - Nebraska.Code()
KCDC- Keeping Secrets Out of Your Pipeline
How Fast Is My App? Performance Testing 101
A Developer’s Guide to Kubernetes Security
How I Learned to Stop Worrying and Love Legacy Code
Ten Ways To Doom Your DevOps
Keeping Your Kubernetes Cluster Secure
Keeping your Kubernetes Cluster Secure
Explain DevOps To Me Like I’m Five: DevOps for Managers
Keeping your Kubernetes Cluster Secure
Creative Solutions to Already Solved Problems II
Creative Solutions to Already Solved Problems
Get to Green: How to Safely Refactor Legacy Code
DevOps for Leadership
Pyramid Discussion: DevOps Adoption in Large, Slow Organizations
A better faster pipeline for software delivery, even in the government

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
System and Network Administraation Chapter 3
PDF
top salesforce developer skills in 2025.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PTS Company Brochure 2025 (1).pdf.......
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Which alternative to Crystal Reports is best for small or large businesses.pdf
Odoo POS Development Services by CandidRoot Solutions
System and Network Administraation Chapter 3
top salesforce developer skills in 2025.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Operating system designcfffgfgggggggvggggggggg
Upgrade and Innovation Strategies for SAP ERP Customers
VVF-Customer-Presentation2025-Ver1.9.pptx
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Wondershare Filmora 15 Crack With Activation Key [2025
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
How to Choose the Right IT Partner for Your Business in Malaysia
Design an Analysis of Algorithms I-SECS-1021-03
Navsoft: AI-Powered Business Solutions & Custom Software Development
Introduction to Artificial Intelligence
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx

Web Application Security Testing: Kali Linux Is the Way to Go

  • 1. 1© Copyright 2014 Coveros, Inc. All rights reserved. Web Application Security Testing: Kali Linux Is the Way to Go Gene Gotimer, Senior Architect gene.gotimer@coveros.com
  • 2. 2© Copyright 2014 Coveros, Inc. All rights reserved.  Coveros helps organizations accelerate the delivery of business value through secure, reliable software About Coveros
  • 3. 3© Copyright 2014 Coveros, Inc. All rights reserved. Kali Linux – www.kali.org  Penetration Testing and Security Auditing Linux distribution  New generation of BackTrack Linux  Debian-based  Many install options: – i386, x86_64, ARM – Android devices – ISO, VMWare, AMI – Installed, virtual, dual boot, live USB – Metapackages
  • 4. 4© Copyright 2014 Coveros, Inc. All rights reserved. Not for general use!  Single user  Default user is root – Many of the tools need root anyway – Live images use toor as default root password  Not recommended for Linux beginners – It is a pen testing and security auditing tool – Easy to mess up the system as root – Easy to attack your organization from within  even unintentionally…
  • 5. 5© Copyright 2014 Coveros, Inc. All rights reserved.
  • 6. 6© Copyright 2014 Coveros, Inc. All rights reserved. Tool Categories  Information Gathering  Vulnerability Analysis  Web Applications  Password Attacks  Wireless Attacks  Exploitation Tools  Sniffing/Spoofing  Maintaining Access  Reverse Engineering  Stress Testing  Hardware Hacking  Forensics  Reporting Tools
  • 7. 7© Copyright 2014 Coveros, Inc. All rights reserved.
  • 8. 8© Copyright 2014 Coveros, Inc. All rights reserved. Top 10 Security Tools  Aircrack-ng – wireless password cracking  Burp Suite – web application proxy and security testing  THC-Hydra – network password cracker  John the Ripper – Unix and Windows password cracker  Maltego – intelligence and forensics
  • 9. 9© Copyright 2014 Coveros, Inc. All rights reserved. Top 10 Security Tools  Metasploit Framework – pentesting and exploitation tool  Nmap – network discovery  OWASP Zed Attack Proxy – web application scanner and proxy  sqlmap – SQL injection detection and exploitation  Wireshark – network protocol analyzer
  • 10. 10© Copyright 2014 Coveros, Inc. All rights reserved. Many more tools  Hundreds of tools  Supporting software – GUI front ends  Greenbone for OpenVAS  Armitage for Metaploit  Zenmap for Nmap – updaters  Metasploit  OpenVAS  Tools are integrated – OpenVAS runs Nikto2, Wapiti, Nmap, Arachni – Metasploit can run OpenVAS
  • 11. 11© Copyright 2014 Coveros, Inc. All rights reserved. Ways to Use Kali Linux  Professional Penetration Testing  Pen test Tool Suite – Install on a USB drive – Carry to the client site – All tools you need are available  Forensic Information Gathering – Live boot into forensic mode – Doesn’t touch internal hard drive – No auto mount of removable media  Password Recovery
  • 12. 12© Copyright 2014 Coveros, Inc. All rights reserved. Ways for non-Pentesters to Use Kali Linux  Tool catalog – Browse menus to find tools in any category  Pre-installed tools – Try a tool to see if it meets your needs – Compare tools  Occasional security tests – Don’t have time/resources to maintain security testing environment  Exploitation software – Demonstrate vulnerabilities
  • 13. 13© Copyright 2014 Coveros, Inc. All rights reserved.  VM with very vulnerable apps  Do not run on production network!  Training apps – WebGoat, Damn Vulnerable Web Application  Realistic, intentionally vulnerable apps  Old, vulnerable versions of real apps  Demo apps  http://code.google.com/p/owaspbwa/ OWASP Broken Web Applications
  • 14. 14© Copyright 2014 Coveros, Inc. All rights reserved.  Discover hosts on a network  Find open ports/services on a host  Fingerprint OS  Identify service versions Network Scanners
  • 15. 15© Copyright 2014 Coveros, Inc. All rights reserved.  Network scanner – Inventory – Discovery – Monitor  Not a vulnerability scanner  Variety of scan depths  Runs in seconds to minutes Nmap / zenmap
  • 16. 16© Copyright 2014 Coveros, Inc. All rights reserved.
  • 17. 17© Copyright 2014 Coveros, Inc. All rights reserved.
  • 18. 18© Copyright 2014 Coveros, Inc. All rights reserved.
  • 19. 19© Copyright 2014 Coveros, Inc. All rights reserved.
  • 20. 20© Copyright 2014 Coveros, Inc. All rights reserved.
  • 21. 21© Copyright 2014 Coveros, Inc. All rights reserved.  Web server scanner – Looks at the server software, e.g., Apache, for misconfigurations  Web application scanner – Looks at the application for vulnerabilities  XSS  SQLi  Command execution – Fuzzing  Typically black-box scans Web Vulnerability Scanner
  • 22. 22© Copyright 2014 Coveros, Inc. All rights reserved. Nikto2  Web server scanner – Not a web application scanner – Looks at Apache  command-line tool – nikto –h 192.168.56.101  Runs in seconds to minutes, as much as a few hours  Report is text-only to the screen
  • 23. 23© Copyright 2014 Coveros, Inc. All rights reserved.
  • 24. 24© Copyright 2014 Coveros, Inc. All rights reserved. - Nikto v2.1.5 --------------------------------------------------------------------------- + Target IP: 192.168.56.101 + Target Hostname: 192.168.56.101 + Target Port: 80 + Start Time: 2014-03-01 14:40:40 (GMT-5) --------------------------------------------------------------------------- + Server: Apache/2.2.14 (Ubuntu) mod_mono/2.4.3 PHP/5.3.2-1ubuntu4.5 with Suhosin-Patch proxy_html/3.0.1 mod_python/3.3.1 Python/2.6.5 mod_ssl/2.2.14 OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4 Perl/v5.10.1 + Server leaks inodes via ETags, header found with file /, inode: 289297, size: 26711, mtime: 0x4e2b33fc8f300 + The anti-clickjacking X-Frame-Options header is not present. + OSVDB-3268: /cgi-bin/: Directory indexing found. + IP address found in the 'location' header. The IP is "127.0.1.1". + OSVDB-630: IIS may reveal its internal or real IP in the Location header via a request to the /images directory. The value is "http://127.0.1.1/images/". + Apache/2.2.14 appears to be outdated (current is at least Apache/2.2.22). Apache 1.3.42 (final release) and 2.0.64 are also current. + mod_ssl/2.2.14 appears to be outdated (current is at least 2.8.31) (may depend on server version) + mod_perl/2.0.4 appears to be outdated (current is at least 2.0.7) + mod_mono/2.4.3 appears to be outdated (current is at least 2.8) Nikto2
  • 25. 25© Copyright 2014 Coveros, Inc. All rights reserved. + OpenSSL/0.9.8k appears to be outdated (current is at least 1.0.1c). OpenSSL 0.9.8r is also current. + Python/2.6.5 appears to be outdated (current is at least 2.7.3) + PHP/5.3.2-1ubuntu4.5 appears to be outdated (current is at least 5.4.4) + Perl/v5.10.1 appears to be outdated (current is at least v5.14.2) + proxy_html/3.0.1 appears to be outdated (current is at least 3.1.2) + mod_ssl/2.2.14 OpenSSL/0.9.8k Phusion_Passenger/3.0.17 mod_perl/2.0.4 Perl/v5.10.1 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082, OSVDB-756. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST + Retrieved x-powered-by header: PHP/5.3.2-1ubuntu4.5 + Cookie phpbb2owaspbwa_data created without the httponly flag + Cookie phpbb2owaspbwa_sid created without the httponly flag + OSVDB-3092: /phpmyadmin/changelog.php: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. + OSVDB-3268: /test/: Directory indexing found. + OSVDB-3092: /test/: This might be interesting... + OSVDB-3092: /cgi-bin/: This might be interesting... possibly a system shell found. + OSVDB-3268: /icons/: Directory indexing found. Nikto2
  • 26. 26© Copyright 2014 Coveros, Inc. All rights reserved. + OSVDB-3268: /images/: Directory indexing found. + OSVDB-3268: /images/?pattern=/etc/*&sort=name: Directory indexing found. + Cookie phpMyAdmin created without the httponly flag + OSVDB-3233: /icons/README: Apache default file found. + Uncommon header 'x-pingback' found, with contents: http://192.168.56.102/wordpress/xmlrpc.php + /wordpress/: A Wordpress installation was found. + /phpmyadmin/: phpMyAdmin directory found + 6544 items checked: 1 error(s) and 32 item(s) reported on remote host + End Time: 2014-03-01 14:41:23 (GMT-5) (43 seconds) --------------------------------------------------------------------------- + 1 host(s) tested Nikto2
  • 27. 27© Copyright 2014 Coveros, Inc. All rights reserved. Wapiti  Web application scanner  Fuzzer  command-line tool – wapiti http://192.168.56.101/vicnum/  Runs in minutes to a few hours – can get “stuck” on a URL  Report is text-only to the screen
  • 28. 28© Copyright 2014 Coveros, Inc. All rights reserved.
  • 29. 29© Copyright 2014 Coveros, Inc. All rights reserved.
  • 30. 30© Copyright 2014 Coveros, Inc. All rights reserved.
  • 31. 31© Copyright 2014 Coveros, Inc. All rights reserved. skipfish  Web application scanner  Fuzzer, very fast with dictionaries  command-line tool – touch wordlist.wl – skipfish –o /root/bsc-20140604 –S /usr/share/skipfish/dictionaries/minimal.wl –W wordlist.wl http://192.168.56.101/  Runs in minutes to hours – Can be time boxed (-k duration in h:m:s)  Report is HTML
  • 32. 32© Copyright 2014 Coveros, Inc. All rights reserved.
  • 33. 33© Copyright 2014 Coveros, Inc. All rights reserved.
  • 34. 34© Copyright 2014 Coveros, Inc. All rights reserved.
  • 35. 35© Copyright 2014 Coveros, Inc. All rights reserved.  Acts as a “man-in-the-middle” – inspect requests and responses – modify in-flight Intercepting Proxy WebProxy Web Browser Web Server
  • 36. 36© Copyright 2014 Coveros, Inc. All rights reserved. OWASP Zed Attack Proxy  Web application scanner and proxy  Intercepting proxy  Fuzzer  Scanner  Spider  GUI interface  Can generate XML and HTML reports
  • 37. 37© Copyright 2014 Coveros, Inc. All rights reserved.
  • 38. 38© Copyright 2014 Coveros, Inc. All rights reserved.
  • 39. 39© Copyright 2014 Coveros, Inc. All rights reserved.
  • 40. 40© Copyright 2014 Coveros, Inc. All rights reserved.  Not just find vulnerabilities, exploit them  Could be a true hacker tool  Can be used to prove vulnerability is real and can be exploited Exploitation Tools
  • 41. 41© Copyright 2014 Coveros, Inc. All rights reserved.  Metasploit Framework– prove vulnerabilities – choose and configure exploit – scan target – choose and configure payload – choose encoding technique – execute exploit  Armitage– Graphical front end – launch scan – suggest exploits Metasploit / Armitage
  • 42. 42© Copyright 2014 Coveros, Inc. All rights reserved.
  • 43. 43© Copyright 2014 Coveros, Inc. All rights reserved.
  • 44. 44© Copyright 2014 Coveros, Inc. All rights reserved.
  • 45. 45© Copyright 2014 Coveros, Inc. All rights reserved.
  • 46. 46© Copyright 2014 Coveros, Inc. All rights reserved.  Audit systems  Track vulnerabilities  Mark false positives  Not good one-time scan tools Vulnerability Management
  • 47. 47© Copyright 2014 Coveros, Inc. All rights reserved. OpenVAS / Greenbone  Open-source fork of Nessus  System vulnerability scanner and manager  Daily feeds of Network Vulnerability Tests (NVTs)  Scans scheduled or on-demand  View results – by host or by scan – deltas  Overrides – false positives – backported fixes
  • 48. 48© Copyright 2014 Coveros, Inc. All rights reserved.
  • 49. 49© Copyright 2014 Coveros, Inc. All rights reserved.
  • 50. 50© Copyright 2014 Coveros, Inc. All rights reserved.
  • 51. 51© Copyright 2014 Coveros, Inc. All rights reserved.
  • 52. 52© Copyright 2014 Coveros, Inc. All rights reserved.  Kali Linux is useful for: – finding security tools – trying security tools – using security tools www.kali.org Summary
  • 53. 53© Copyright 2014 Coveros, Inc. All rights reserved.  Coveros is an ICAgile Member Training Organization (MTO) with courses accredited by ICAgile.  By participating in this session, you have started upon the path to earning internationally recognized Agile Professional Certifications. This course covers 4 of the more than 400 learning objectives from the ICAgile Learning Roadmap.  To claim your learning credits, navigate to www.icagile.com and select link to claim ICAgile learning credits.  You will need to register and provide the code for this specific event: BSW14-WSTL Congratulations!
  • 54. 54© Copyright 2014 Coveros, Inc. All rights reserved. Gene Gotimer gene.gotimer@coveros.com www.coveros.com @CoverosGene Questions?