Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Identifying web application firewalls


We are more than likely going to encounter a web application firewall (WAF) when we are testing. These are designed to identify most of the attacks we have covered in this chapter (well, most of the URL-based attacks). We will once again turn to the Kali Linux distribution to identify a WAF. You will need your Kali Linux machine and your WAF machine we created in Chapter 6, Creating an External Attack Architecture.

Once the machines are up and running, the first thing we will do is identify we have a website protected by a web application firewall. We have several methods to do this, each with varying success. The first method we will try is the Nmap tool.

In your Kali Linux machine, open a terminal window and enter nmap –p 80 -–script –http-waf-detect <target IP address>. This scripting engine will try to determine whether there is a web application firewall present. An example is shown in the following screenshot:

As the previous screenshot shows...