Guess what? Looks like I will be having a workshop on Testwarez this year! Yay! This is good news and I am more than happy to by able to share some OWASP tools, ideas and knowledge with the participants.
What will we talk about? The idea is to show how to use a forward proxy like OWASP ZAP, go through a simple pentest scenario, and in the end let the participants hack their way through a specially crafted virtual machine image containing some vulnerable web applications we have created ourself.
For this workshop to be successful, we will need the participants to do some preparation work before. Believe me, the workshop is worth the effort. 🙂
So, if you are planing to attend:
- Remember to bring your own device! Anything with Windows, Linux will (most probably) do.
- Install OWASP ZAP.
- Install Oracle VirtualBox. We have tested the app with the 5.0 release the last time, but looks like the 5.1 release works fine too.
- Download and import the machine image we have created. The checksums are MD5: 3AE84EE66CA334D4001FFA966404639B and SHA1: 5F2F417995D8D52C4C58AD13C07C0B8EA9C8547E
There is absolutely no need to give the machine internet access, so you will do perfectly fine by running the machine in a host-only network. If you don’t know how to configure such thing in VirtualBox – don’t worry. It will be one of the first things we will show on the workshop. Still, you might want to install the tolls and the image before the workshop to simply save time.
The machine is lightweight. It will not eat to much resources. Oh, and you will not get any credentials to access the machine. 🙂 The idea was to get shell access by exploiting some application vulnerabilities in the first place.
But, if you are not planing to attend (and you know a bit about application security), you might still have a lot of fun by playing with the virtual machine we have created. Just treat it as a capture the flag exercise and get a local root shell access. 🙂
So, see you on Testwarez!