- Kali Linux Web Penetration Testing Cookbook
- Gilberto Nájera Gutiérrez
- 499字
- 2021-07-16 12:53:50
Finding files and folders with ZAP
OWASP ZAP (Zed Attack Proxy) is a very versatile tool for web security testing. It has a proxy, passive and active vulnerability scanners, fuzzer, spider, HTTP request sender, and some other interesting features. In this recipe, we will use the recently added "Forced Browse", which is the implementation of DirBuster inside ZAP.
Getting ready
For this recipe to work, we need to use ZAP as a proxy for our web browser:
- Start OWASP ZAP and, from the application's menu, navigate to: Applications | Kali Linux | Web Applications | Web Application Fuzzers | owasp-zap.
- In Mantra or Iceweasel, go to the main menu and navigate to Preferences | Advanced | Network, in Connection click on Settings…
- Chose a Manual proxy configuration and set
127.0.0.1
as the HTTP proxy and 8080 as the port. Check the option to use the same proxy for all protocols and then click on OK. - Now, we need to tell ZAP the file where it is going to get the directory names from. Go to ZAP's menu and navigate to Tools | Options | Forced Browse and then click on Select File…
- Kali Linux includes some word lists. We will be using one of them: select the file
/usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-small.txt
and click on Open. - An alert will tell us that the file was installed. Click on OK and on OK again to leave the Options dialog.
How to do it...
- Having configured the proxy properly, browse to
http://192.168.56.102/WackoPicko
. - We will see ZAP reacting to this action by showing the tree structure of the host we just visited.
- Now, in ZAP's upper-left panel (the Sites tab) right-click on the
WackoPicko
folder inside thehttp://192.168.56.102
site. Then in the context menu navigate to Attack | Forced Browse directory: - In the bottom panel, we will see that the Forced Browse tab is displayed. Here we can see the progress of the scan and its results:
How it works...
When we configure our browser to use ZAP as a proxy, it doesn't send the requests directly to the server that hosts the pages we want to see but rather to the address we defined, in this case the one where ZAP is listening. Then ZAP forwards the request to the server but not without analyzing the information we sent.
ZAP's Forced Browse works the same way DirBuster does; it takes the dictionary we configured and sends requests to the server, as if it was trying to browse to the files in the list. If the files exist the server will respond accordingly, if they don't exist or aren't accessible by our current user, the server will return an error.
See also
Another very useful proxy included in Kali Linux is BurpSuite. It also has some very interesting features; one that can be used as an alternative for the Forced Browse we just used is Burp's Intruder. Although it is not specifically intended for that purpose, it is a versatile tool worth checking.
- Getting Started with Gulp(Second Edition)
- Learn to Create WordPress Themes by Building 5 Projects
- PHP 編程從入門到實(shí)踐
- Mastering Python Networking
- Getting Started with Laravel 4
- Geospatial Development By Example with Python
- Buildbox 2.x Game Development
- QlikView Unlocked
- Hands-On Robotics Programming with C++
- 視窗軟件設(shè)計(jì)和開發(fā)自動(dòng)化:可視化D++語言
- Python Machine Learning Cookbook
- 計(jì)算機(jī)應(yīng)用基礎(chǔ)(Windows 7+Office 2010)
- Learning NHibernate 4
- Natural Language Processing with Python Cookbook
- 軟件測試項(xiàng)目實(shí)戰(zhàn)之功能測試篇