Author: Eduardo R. B. Marques, DCC/FCUP
Exercises marked with (C) will be covered in class, and exercises marked with (H) are left as homework.
Access the DVWA server (e.g. running on the GCP VM instance we created last class) and consider the XSS (Reflected) and XSS (Stored) sections.
For each section and security level examine:
What are the input validation mechanisms and other protections involved? Try to circumvent them by conducting an attack manually.
Check if the SonarCloud analysis provides some clues to the security vulnerabilities.
Install the ZAP proxy if you have not do so previously. Then use ZAP to:
Proceed as in exercise 1 but for the CSRF functionality, but excluding ZAP attacks.
To exploit the vulnerabilities in some DVWA security levels you may need to craft a malicious HTML page.
Proceed as in exercise 1 but for the XSS (DOM) functionality.
Try out WebGoat, a vulnerable web application written in Java.
Explore some WebGoat "lessons" referring to vulnerabilities we have discussed in the last few classes.
Links: