Table of Contents
On this lab we will attack Rails Goat (our vulnerable app).
- Log into your AWS instance and run Rails Goat. This should be a continuation from the previous lab.
$ vagrant ssh
$ export RAILS_ENV=mysql
$ bundle exec rails server -b 0.0.0.0 -p 8080
- Load
http://PUBLIC_IP_ADDRESS:8080on your browser.
We use Burp Proxy to intercept our browser's requests before they are sent to the Web application. This gives us the chance to modify the HTTP request before it is submitted.
- Download and run Burp Proxy (Free Edition).
https://portswigger.net/burp/download.html
-
Select
Temporary projectand clickNext. SelectUse Burp defaultsand clickStart Burp. -
Setup your browser to use the burp proxy.
E.g., on Firefox, Preferences > Advanced > Network > Settings. Select Manual proxy configuration and put localhost and 8080 for HTTP Proxy and Port.
- Now reload your browser and take a look at
Burp > Proxy > Intercept. Here you can modify requests before they are submitted by the browser. ClickForward.
Do exercise A1: SQL Injection Concatentation
Do exercise A1: Command Injection
Do 7 of the 14 exercises at https://github.com/OWASP/railsgoat/wiki