ccs374-WebApplicationSecurity Lab Manual
ccs374-WebApplicationSecurity Lab Manual
COIMBATORE
PRACTICAL RECORD
NAME : …………………………………………………
REG.NO :………………………………………………….
DEPARTMENT : …………………………………………………
SEMESTER :……………………………………………………….
BONAFIDE CERTIFICATE
DEPARTMENT : …………………………………………….
SEMESTER : …………………………………………….
PERIOD : …………………………………………….
Certified that this is the Bonafide Record of work done by the above student for
the……………………………………………………………during the year……………..
Date:
Aim:
Algorithm:
Step 1: Start
Step 2: Install wireshark
Step 3: Start wireshark
Step 4: Analyze the difference between HTTP vs HTTPS
Step 5: View Server Output
Step 6: Stop
Program:
# Installing wireshark in Ubuntu:
sudo apt install wireshark sudo
usermod -aG wireshark $USER sudo
wireshark
Aim:
2. To Analyze the various security mechanism embedded with different
protocols
Algorithm:
Step 1: Start
Step 2: Start wireshark
Step 3: Analyze the various security mechanism embedded with different
protocol
Step 4: View Server Output
Step 5: Stop
Program:
#capture HTTPS traffic:
sudo tcpdump -i <interface> -w https_traffic.pcap 'port 443'
Result:
Thus, the experiment to analyze the various security mechanism
embedded with different protocols is executed and verified successfully.
Ex.No: 02
Date:
Aim:
To Identify the Vulnerabilities Using Owasp Zap Tool
Procedure:
1. Install OWASP ZAP:
1. Download and install OWASP ZAP from the official website.
2. Configure Browser Proxy
1. Set up your browser to use ZAP as a proxy server (Default: localhost,
Port: 8080).
Experiment Steps:
1. Launch OWASP ZAP:
□ Open the OWASP ZAP tool
2. Start ZAP Proxy:
1. In ZAP, click on the 'Quick Start' tab.
2. Start the ZAP Proxy.
3. Set Target Application:
1. Go to the "Sites" tab.
2. Enter the URL of the target application.
3. Right-click on the URL and choose "Include in Context" > "Default
Con- text" to add it for scanning.
4. Spider the Application:
1. Go to the "Spider" tab.
2. Right-click on the target URL and select "Spider" to crawl the application.
3. Let ZAP crawl and map the application structure.
5. Active Scan:
1. Go to the "Attack" tab.
2. Choose "Active Scan."
3. Configure the scan settings (scope, intensity, etc.).
4. Start the active scan on the target application.
6. Review Scan Results:
1. After the scan completes, go to the "Alerts" tab.
2. View the list of vulnerabilities discovered by ZAP.
7. Investigate Vulnerabilities:
1. Click on each vulnerability to get detailed information.
2. Verify and understand the nature and potential impact of each issue.
8. Prioritize and Document:
1. Prioritize vulnerabilities based on severity and potential impact.
2. Document the identified vulnerabilities with descriptions, severity levels,
affected URLs, and possible remediation steps.
9. Report Generation:
1. Go to the "Report" tab.
2. Generate a comprehensive report summarizing the identified vulnerabili-
ties and their details.
3. Choose the appropriate report format (HTML, PDF, etc.).
10. Remediation and Re-scan:
1. Work on fixing or mitigating the identified vulnerabilities.
2. After making changes, perform another scan using ZAP to verify that the
issues have been resolved.
11. Continuous Monitoring:
1. Schedule regular scans using ZAP to continuously monitor the
applica- tion's security posture.
2. Regularly review and update the security measures based on new findings
Result:
Thus, the experiment to identify vulnerabilities using OWASP Zap tool is
executed and verified successfully.
Ex.No: 03
Aim:
To create a simple REST API using python to do the GET, POST, PUT
and DELETE operations
Algorithm:
Step 1: Start
Step 2: Install Flask
Step 3: Start the Flask App
Step 4: Use Postman to Test Endpoints
Step 5: View Server Output
Step 6: Stop
Program:
Click "Send."
Step 4: View Server Output
Result:
Thus, the experiment to create a simple REST API using python to do the
GET, POST, PUT and DELETE operations is executed and verified successfully.
Ex.No: 04
SQL Injection
Date:
Aim:
1. To Install Burp Suite to do following vulnerabilities:
□ SQL Injection
Procedure:
1. Install Burpsuite and connect the burpsuite proxy in browser proxy settings.
2. Turn on the intercept and search for the website which needs to be captured.
3. Send the intercepted request to the intruder and load the SQL Injection File
from the device which is already installed.
4. Start the attack in the intruder and search for the requests & responses in the
render screen for SQL Injection.
5. After the attack, some response render shows the username and password for
the webpage.
Result:
Thus the above vulnerability is successfully executed and verified.
Ex.No: 04
Cross-Site Scripting (XSS)
Date:
Aim:
2. To Install Burp Suite to do following vulnerabilities:
1. Cross-Site Scripting (XSS)
Procedure:
1. Turn on the intercept and search for the website which needs to be captured.
2. Add the captured request to the Target scope.
3. Go to Target section and search for the captured request in the item field and
send the target item to the repeater.
4. The request in the repeater section will be modified and send to the Decoder.
5. Before sending the response to the browser, Copy the URL below and paste
into a browser that to configured to use Burp as its proxy.
6. Open the browser to see the modified response. An alert message is popup
while opening the website.
Result:
Thus the above vulnerability is successfully executed and verified.
Ex.No: 05
Date:
Aim:
Step 2: As of now you are on a desktop so here you have to create a new
directory named SEToolkit using the following command.
>>>mkdir SEToolkit
Step 3: Now as you are in the Desktop directory however you have created a
SEToolkit directory so move to SEToolkit directory using the following
command
>>>cd SEToolkit
Step 4: Now you are in SEToolkit directory here you have to clone SEToolkit
from GitHub so you can use it.
>>>cd setoolkit
Step 8: Finally all the processes of installation have been completed now it’s
time to run the social engineering toolkit .to run the SEToolkit type following
command.
>>>Setoolkit
Step 9: At this step, setoolkit will ask you (y) or (n). Type y and your social
Step 10: Now your setoolkit has been downloaded into your system now it’s
time to use it .now you have to choose an option from the following
options .here we are choosing option 2
Website Attack Vector
Option: 2
Step 11: Now we are about to set up a phishing page so here we will choose
option 3 that is the credential harvester attack method.
Option: 3
Step 12: Now since we are creating a Phishing page so here we will choose
option 1 that is web templates.
Option: 1
Step 13: Create a google phishing page so choose option 2 for that then a
phishing page will be generated on your localhost.
RESULT:
Thus, the experiment to attach the website using social engineering
method is executed and verified successfully.