[...]... .22 2 Web Applications: The New Challenge 22 3 Chapter Scope .22 3 Approach 22 4 Web Server Testing 22 5 CGI and Default Pages Testing 22 6 Web Application Testing .22 7 Core... 21 7 Arguments Viewable by All Users .21 8 History and Trace Logs 21 8 Further Information 21 8 Chapter 4 Web Server and Web Application Testing 22 1 Objectives 22 2 Introduction 22 2... .22 7 Web Server Exploit Basics 22 7 What Are We Talking About? .22 7 CGI and Default Page Exploitation 23 2 Web Application Assessment .23 4 Information Gathering Attacks 23 5 File System and Directory Traversal Attacks 23 5... 23 5 Database Query Injection Attacks 23 5 Cross-site Scripting Attacks 23 6 Impersonation Attacks 23 6 Parameter Passing Attacks 23 7 Open Source Tools 23 7 Intelligence Gathering Tools .23 7 Scanning... 51 Open Source Windows Tools 62 Footprinting Tools 66 Web Resources 67 Linux/UNIX Console Tools 68 Open Source Windows Tools 70 Verification Tools . 72 Web Resources ... 123 Nmap: Banner Grabbing 123 Netcat 123 P0f: Passive OS Fingerprinting . 126 Xprobe2: OS Fingerprinting 126 Httprint 128 Contents Ike-scan: VPN Assessment 129 Amap: Application... .24 6 Assessment Tools 25 8 Authentication 26 2 Proxy 27 4 Exploitation Tools 27 7 Metasploit 27 7 SQL Injection Tools 28 0 Case Studies:... 28 8 Web Server Assessments 28 8 CGI and Default Page Exploitation 29 3 Web Application Assessment .3 02 Contents Chapter 5 Wireless Penetration Testing Using BackTrack 2 323 Introduction 324 Approach ... Chapter 9 Building Penetration Test Labs 519 Introduction 520 Setting Up a Penetration Test Lab 520 Safety First 520 Isolating the Network 521 Concealing the Network Configuration . 522 Securing Install... 523 Transferring Data 525 Labeling 526 Destruction and Sanitization 526 Reports of Findings 527 Final Word on Safety . 529 Types of Pen-Test Labs . 529 The Virtual . . . . . . . . . . . . . . . . . . . .22 2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2 Web Server Vulnerabilities: A Short. . . . . . . . . . . . . . . . . . . . . . . . .22 2 Web Applications: The New Challenge . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 3 Chapter Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 62 Case Studies: Using Open Source and Closed Source Tools. . . . . . . . . . . . . . . .164 Microsoft SQL Server . . .