This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Section 2: WebGoat"
(→Lesson Table Of Contents: add content) |
(→Lesson Table Of Contents: modify content) |
||
Line 48: | Line 48: | ||
The Table of Contents for WebGoat 5.2 beta 1 with the numbering system used for this project is: | The Table of Contents for WebGoat 5.2 beta 1 with the numbering system used for this project is: | ||
− | + | {{{ | |
1. General | 1. General | ||
1.1 Http Basics | 1.1 Http Basics | ||
Line 157: | Line 157: | ||
19. The Challenge | 19. The Challenge | ||
19.1 The CHALLENGE! | 19.1 The CHALLENGE! | ||
+ | }}} | ||
== Overview of lesson results == | == Overview of lesson results == |
Revision as of 05:45, 24 July 2008
Overview
From the WebGoat home page at OWASP: "WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use SQL injection to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson."
WebGoat can be downloaded from http://code.google.com/p/webgoat/downloads/list. It runs within Tomcat and can either be used stand-alone "out-of-the-box" with a version of Tomcat that is packaged with it, or a WebGoat.war file can be dropped onto an existing Tomcat installation.
Explaining WebGoat and the WebGoat lessons in detail is beyond the scope of this document. Each sublesson has a solution - available from the menu at the top of each lesson - that explains the purpose of the lesson. The motivation of the WebGoat solution (which is exploiting the vulnerability) is often accompanied by screenshots of WebGoat and WebScarab, the web proxy that is used in the solutions. If the reader does not wish to go through the WebGoat lessons themselves, the solutions are the "cheat sheets" for WebGoat, and because of that the solutions are provided in this project's documentation as is. If this is insufficient, installing and using WebGoat may be necessary to gain a complete understanding of the lessons.
How it works
WebGoat users are configured in the tomcat-users.xml configuration file.
Here is the WebGoat login page, which uses Basic Authentication:
Next is the entrance/start page; a JSESSIONID cookie is set for the session variable:
Here is an overview of the lesson menu on the left side of the page that is used for navigation:
Each WebGoat lesson is designated by the 'menu' parameter in the query string. In the screen shot below, the 'screen' parameter will vary but the 'menu' parameter will always be 900 for this lesson. There is no similar way of easily identifying sublessons within a lesson or stages within a sublesson; ths sublesson 'Stored XSS Attacks' will also have 'menu' value of 900, and each of the stages in the 'LAB: Cross-Site Scripting' sublesson will always have 'menu' value of 900:
When a WebGoat lesson is completed successfully, there are 3 different areas that denote this:
- A message in red in the body of the HTML page and a green check mark beside the lesson in the menu on the left side:
- A report card in Section 18 of WebGoat:
Lesson Table Of Contents
The WebGoat lessons are structured as main lessons, which are broken up into sub-lessons, and a sublesson may have several stages. For the purpose of this project, a numbering system is introduced to reference them. The unit of measure will be a sublesson. Lessons are too general and the amount of content for each one varies greatly, while using a stage as the unit of measure is too low-level and would be confusing.
The Table of Contents for WebGoat 5.2 beta 1 with the numbering system used for this project is: {{{ 1. General 1.1 Http Basics 1.2 HTTP Splitting
2. Access Control Flaws 2.1 Using an Access Control Matrix 2.2 Bypass a Path Based Access Control Scheme 2.3 LAB: Role Based Access Control Stage 1: Bypass Business Layer Access Control Stage 2: Add Business Layer Access Control Stage 3: Bypass Data Layer Access Control Stage 4: Add Data Layer Access Control 2.4 Remote Admin Access
3. AJAX Security 3.1 LAB: Client Side Filtering 3.2 LAB: DOM-Based cross-site scripting 3.3 DOM Injection 3.4 Same Origin Policy Protection 3.5 XML Injection 3.6 JSON Injection 3.7 Silent Transactions Attacks 3.8 Insecure Client Storage Stage 1: Stage 2: 3.9 Dangerous Use of Eval
4. Authentication Flaws 4.1 Password Strength 4.2 Forgot Password 4.3 Basic Authentication 4.4 Multi Level Login 1 4.5 Multi Level Login 2
5. Buffer Overflows
6. Code Quality 6.1 Discover Clues in the HTML
7. Concurrency 7.1 Thread Safety Problem 7.2 Shopping Cart Concurrency Flaw
8. Cross-Site Scripting (XSS) 8.1 Phishing with XSS 8.2 LAB: Cross Site Scripting Stage 1: Stored XSS Stage 2: Block Stored XSS using Input Validation Stage 3: Stored XSS Revisited Stage 4: Block Stored XSS using Output Encoding Stage 5: Reflected XSS Stage 6: Block Reflected XSS 8.3 Stored XSS Attacks 8.4 Reflected XSS Attacks 8.5 Cross Site Request Forgery (CSRF) 8.6 HTTPOnly Test 8.7 Cross Site Tracing (XST) Attacks
9. Denial of Service 9.1 Denial of Service from Multiple Logins
10. Improper Error Handling 10.1 Fail Open Authentication Scheme
11. Injection Flaws 11.1 Command Injection 11.2 Blind SQL Injection 11.3 Numeric SQL Injection 11.4 Log Spoofing 11.5 XPATH Injection 11.6 String SQL Injection 11.7 LAB: SQL Injection Stage 1: String SQL Injection Stage 2: Parameterized Query #1 Stage 3: Numeric SQL Injection Stage 4: Parameterized Query #2 11.8 Database Backdoors
12. Insecure Communication 12.1 Insecure Login
13. Insecure Configuration 13.1 Forced Browsing
14. Insecure Storage 14.1 Encoding Basics
15. Parameter Tampering 15.1 Exploit Hidden Fields 15.2 Exploit Unchecked Email 15.3 Bypass Client Side JavaScript Validation
16. Session Management Flaws 16.1 Spoof an Authentication Cookie 16.2 Hijack a Session 16.3 Session Fixation
17. Web Services 17.1 Create a SOAP Request 17.2 WSDL Scanning 17.3 Web Service SAX Injection 17.4 Web Service SQL Injection
18. Admin Functions 18.1 Report Card
19. The Challenge 19.1 The CHALLENGE! }}}