Presentation Dhananjaya B-1
Presentation Dhananjaya B-1
1. Install Zphisher :
o Use appropriate commands to install Zphisher in Kali Linux.
o Include a screenshot of the successful installation.
2. Explore Mutillidae:
o Briefly describe the purpose of Mutillidae as a web application testing tool.
BROWSING THE XAMPP TO ONSTALL MUTILLIDAE
Download the xampp for the linux os
ALLOWING TO INSTALL
HOME PAGE OF THE XAMPP. TO PROVIDE WEB
SEVER TO THE MUTILLIDAE
COPY THE LINK OF THE MUTILLIDAE LINK FROM
THE BROWSER&
PASTE INTO TERMINAL WITH SOME ABOVE
WEB PAGE OF THE MUTILLIDAE
HOME PAGE OF THE
MUTILLIDAE.
WE CAN USE SOME TOOLS RELATED TO WEB
APPLICATION TESTING TOOL, AS ABOVE
MENTIONED.
I HAD CREATE MY OWN ACCOUNT
IN LAB TOOL WE CAN ATTEMPT QUIZ AND
SOLUTION RELATED WEB APPLICATION.
2. Explore Mutillidae
Mutillidae is a vulnerable web application designed to simulate real-world vulnerabilities, such as SQL
injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and more. Here’s how to
explore it:
Accessing the Mutillidae Dashboard
Once installed, navigate to the Mutillidae dashboard by visiting:
arduino
http://localhost/mutillidae
Here, you will be able to view the following:
•Home Page: The landing page of Mutillidae contains various links and security exercises.
•Login Form: The login page is intentionally vulnerable to SQL injection attacks, so you can practice
exploiting this vulnerability.
•Admin Panel: The admin panel allows you to test your skills on privilege escalation and other web
application vulnerabilities.
•Vulnerable Pages: Mutillidae includes several vulnerable pages where you can practice techniques
such as:
•SQL Injection
•Cross-Site Scripting (XSS)
•File Inclusion Attacks
•Command Injection
Example of Vulnerable Features to Explore
1.SQL Injection:
•Try exploiting the login form by using SQL injection
techniques. For example, using ' OR '1'='1 as the
username and password should bypass the login.
2.Cross-Site Scripting (XSS):
•You can input malicious JavaScript code into form fields to
see how the app is vulnerable to XSS attacks.
3.File Inclusion:
•Try exploiting the file inclusion vulnerability by modifying
URL parameters to include files from the server.
4.Cross-Site Request Forgery (CSRF):
•Test how well the app is protected from CSRF attacks by
submitting forms without proper authentication.
Task 4
Demonstrating Applications in Pen Testing
o Tool 1: Describe the tool, show how to launch it, and document an
example test .
o Tool 2: Repeat the same steps for another tool.
2. Include the Following: o Commands used.
o Screenshots of results or outcomes. o Brief explanations of what
the tool achieved.
SOCIAL ENGINEERING TOOL IN THE KALI LINUX TOOLS.
USING THE TOOL SET TOOL KIT
SELECTING THE OPTION 01
AFTER SELECTING THE OPTION 01 WE GET INTO THIS TERMINAL TO SELECT THE PORT AND I SELECTED THE 08
THIS TERMINAL IS FOR TO ENTER THE URL OF ANY WEBSITE TO TAKE THEIR QR CODE
I ENTERED THE YOUTUBR URL
THE QR CODE IS GENERATED IN A HIDDEN FILE ………..FINDING TO GET THE QR CODE
FOLDER PAGE
THE QR CODE IS HIDDEN IN THE ROOT FOLDER
THRE QR CODDE IS HIDDEN IN .SET FOLDER
IN REPORTSTH QR CODE IS GENERATED
THE GENERATED QR CODE
TOOL 2 USING THE TOOL ZENMAP
THE PAGE OF THE ZENMAP AND I AM ENTERING THE TARGET 203.0.113.0/24 AND GIVING THE PROFILE “PING SCAN “
NMAP OUTPUT
TROPOLOGY OF THE APPIED TARGET
HOST DEATIS OF THE APPLIED TARGET IN ZENMAP
DETAAILS OF THE SCANS OF THE APPLIRD TARGET
CONCLUSION :
Environment Setup
•Virtualization: Setting up a proper penetration testing environment is crucial for security testing. Using virtual machines
ensures isolation, allowing the tools to operate without affecting the primary system.
•Kali Linux: Kali Linux is a powerful penetration testing operating system, preloaded with tools required for security
testing. Understanding how to set up a Kali Linux VM and configure essential network settings was essential for a smooth
testing environment.
•Network Configuration: Ensuring that the virtual machines are properly networked together for penetration testing,
allowing you to conduct security tests without interfering with external systems.
Zphisher Setup
•Phishing Automation: Zphisher is a tool for creating phishing pages. Learning to set it up on Kali Linux allowed for the
exploration of phishing attacks in a controlled environment.
•Social Engineering: The use of phishing attacks demonstrated the importance of social engineering in penetration testing.
Zphisher makes it easy to create convincing phishing pages, which highlights how attackers can trick users into divulging
personal information.
•Ethical Use: The importance of using phishing attacks in ethical and legal environments is critical. Understanding how phishing
works, combined with the knowledge gained from using Zphisher, provides an in-depth view of these attacks.
Website Phishing Exploration
•Phishing Techniques: Experimenting with website phishing demonstrated how attackers mimic legitimate websites to steal
sensitive data. Recognizing common phishing tactics such as URL manipulation, credential harvesting, and using fake login
forms is critical for cybersecurity professionals.
•Detection and Prevention: Understanding how phishing works is essential for developing defenses against it. Exploring how
web servers handle phishing attacks also helped in understanding the technical measures to mitigate such threats.
CHALLENGES FACED
Zphisher Setup Challenges
•Tool Dependencies: Zphisher required additional libraries and dependencies to run smoothly on Kali Linux. Resolving these
dependencies took time and required knowledge of package management in Kali Linux.
•Ethical Considerations: While setting up Zphisher, it was important to ensure that phishing pages were not deployed in
environments that could cause harm or violate laws. Maintaining ethical standards in penetration testing and phishing
exercises is essential.
•Network Configuration: Ensuring that the tool operated correctly in the virtualized network environment sometimes
required network configuration adjustments, which took extra time.
Website Phishing Exploration Challenges
•Realistic Page Design: Designing convincing phishing pages that could bypass detection required attention to detail. Simple
mistakes like incorrect branding or text could make the page easily detectable by trained users or security systems.
•Legal Concerns: Engaging in phishing activities, even in a testing environment, carries legal and ethical considerations.
Ensuring that phishing tests are conducted in a controlled, ethical, and legal manner is crucial.
•Detection and Mitigation: Understanding and identifying countermeasures against phishing, like SSL/TLS encryption and
multi-factor authentication, was a challenge. Building defenses against phishing attacks is just as important as learning to
exploit Them .