Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Analyzing the OWASP Top Ten attacks


The Open Web Application Security Project (OWASP) group is one of the best resources we can use for gathering information on not only the different types of attacks but also the ways to defend from them and secure coding guidance. As we are in our testing mode, we will concentrate on the attacks. An excellent reference for this is the OWASP Top Ten attacks. You can download the latest version at https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project.

The OWASP group also has an excellent tutorial called WebGoat. You can find more information about the tutorial at https://www.owasp.org/index.php/OWASP/Training/OWASP_WebGoat_Project.

An advantage of selecting the OWASP Broken Web Application virtual machine is the tools that come with it. Once you have started the OWASP virtual machine, you will have an address assigned for the interface that we need to connect to. For this example in the book, the interface has been assigned the IP address of 10.2...