Launching website attacks
As mentioned in the previous sections, web servers represent a network device that resides on both the internal and external networks and can be used as a pathway to internal segments if successfully compromised. In addition to being a jumping off point to the internal network, web applications frequently handle sensitive data such as customer data, payment information, or medical records – all of which are valuable.
Focusing on the web applications themselves, we will use Vega to perform a deeper analysis on the install applications to identify possible opportunities.
Note
We will be focusing on the web applications specifically since we cover platform and daemon vulnerabilities in Chapter 3, Vulnerability Analysis and Chapter 4, Finding Exploits in the Target.
Getting ready
To successfully complete this section, we will need the following:
- Installation and configuration of OWASP-BWA as highlighted in the recipe Installing OWASP-BWA in Chapter 1, Installing Kali and...