11XVWA Technical Run
11XVWA Technical Run
• Link: https://github.com/s4n7h0/xvwa
◎Test environment
• Kali linux (SMP Debian 4.6.4-1kali1) with XVWA docker image.
IP:192.168.10.12
• Mysql database
mysql Ver 14.14 Distrib 5.6.30, for debian-linux-gnu (x86_64) using
EditLine wrapper
• Apache webserver
Server version: Apache/2.4.25 (Debian)
◎Checking vulnerability
POST Request: item=&search='
◎Checking vulnerability
POST Request that returns ‘false’ -> item=&search=‘ and 1=0#
If the web application is vulnerable to SQL Injection, then it probably will not return
anything.
◎Vulnerability
If the web application is vulnerable to SQL Injection, then it probably will not return
anything.To make sure, the attacker will inject a query that will return 'true‘; If the
content of the page that returns 'true' is different than that of the page that returns 'false',
then the attacker is able to distinguish when the executed query returns true or false.
POST Request that returns ‘false’ -> item=&search=‘ and 9=9#
◎Example: 8.8.8.8; echo "¥n"; echo "Date $(date)" echo "¥n"; && ifconfig
• Input
http://192.168.10.12/xvwa/vulnerabilities/reflected_xss/?item=ITEM
• Output
• Output
◎Vulnerability discovery
• Access
http://192.168.10.12/xvwa/vulnerabilities/dom_xss/
• Input
http://192.168.10.12/xvwa/vulnerabilities/dom_xss/?search=adi
• Output
◎Vulnerability discovery
• Output
Output is not showing in source code. But show in Inspect Element
because input is not maded by PHP or backend code. Its occur from
JavaScript Code. So its not show in source code directly and just only work
in browser.
Function search() explained: When ?search found in URL , the input
after ?search= will show in the element that is defined by id=srch. Can use
html tag for XSS purpose.
◎Vulnerability discovery
• Input
• Output
• OWASP
https://www.owasp.org/index.php/Category:Attack
• Github
https://github.com/s4n7h0/xvwa
https://github.com/tuxotron/xvwa_lamp_container