Kali Linux - Website Penetration Testing - Tutorialspoint
Kali Linux - Website Penetration Testing - Tutorialspoint
In this chapter, we will learn about website penetration testing offered by Kali Linux.
Vega Usage
Vega is a free and open source scanner and testing platform to test the security of web
applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS),
inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI
based, and runs on Linux, OS X, and Windows.
Vega includes an automated scanner for quick tests and an intercepting proxy for tactical
inspection. Vega can be extended using a powerful API in the language of the web: JavaScript. The
official webpage is https://subgraph.com/vega/
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 1/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 2 − If you don’t see an application in the path, type the following command.
Step 4 − Enter the webpage URL that will be scanned. In this case, it is metasploitable machine →
click “ Next”.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 2/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 5 − Check all the boxes of the modules you want to be controlled. Then, click “Next”.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 3/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 4/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 5/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 9 − After the scan is completed, on the left down panel you can see all the findings, that are
categorized according to the severity. If you click it, you will see all the details of the vulnerabilities
on the right panel such as “Request”, ”Discussion”, ”Impact”, and ”Remediation”.
ZapProxy
ZAP-OWASP Zed Attack Proxy is an easy-to-use integrated penetration testing tool for finding
vulnerabilities in web applications. It is a Java interface.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 7/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 8/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 3 − Choose one of the Options from as shown in the following screenshot and click “Start”.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 9/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 10/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 4 − Enter URL of the testing web at “URL to attack” → click “Attack”.
After the scan is completed, on the top left panel you will see all the crawled sites.
In the left panel “Alerts”, you will see all the findings along with the description.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 11/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 5 − Click “Spider” and you will see all the links scanned.
sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and
exploiting SQL injection flaws and taking over of database servers. It comes with a powerful
detection engine, many niche features for the ultimate penetration tester and a broad range of
switches lasting from database fingerprinting, over data fetching from the database, to accessing
the underlying file system and executing commands on the operating system via out-of-band
connections.
Let’s learn how to use sqlmap.
Step 1 − To open sqlmap, go to Applications → 04-Database Assessment → sqlmap.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 12/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 2 − To start the sql injection testing, type “sqlmap – u URL of victim”
Step 3 − From the results, you will see that some variable are vulnerable.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 13/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
sqlninja
sqlninja is a SQL Injection on Microsoft SQL Server to a full GUI access. sqlninja is a tool targeted
to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its
back-end. Full information regarding this tool can be found on http://sqlninja.sourceforge.net/
Step 1 − To open sqlninja go to Applications → 04-Database Assesment → sqlninja.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 14/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
WPScan
WPScan is a black box WordPress vulnerability scanner that can be used to scan remote
WordPress installations to find security issues.
Step 1 − To open WPscan go to Applications → 03-Web Application Analysis → “wpscan”.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 15/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 16/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Once the scan starts, you will see the findings. In the following screenshot, vulnerabilities are
indicated by a red arrow.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 17/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Joomscan
Joomla is probably the most widely-used CMS out there due to its flexibility. For this CMS, it is a
Joomla scanner. It will help web developers and web masters to help identify possible security
weaknesses on their deployed Joomla sites.
Step 1 − To open it, just click the left panel at the terminal, then “joomscan – parameter”.
Step 2 − To get help for the usage type “joomscan /?”
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 18/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
TLSSLed is a Linux shell script used to evaluate the security of a target SSL/TLS (HTTPS) web
server implementation. It is based on sslscan, a thorough SSL/TLS scanner that is based on the
openssl library, and on the “openssl s_client” command line tool.
The current tests include checking if the target supports the SSLv2 protocol, the NULL cipher, weak
ciphers based on their key length (40 or 56 bits), the availability of strong ciphers (like AES), if the
digital certificate is MD5 signed, and the current SSL/TLS renegotiation capabilities.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 19/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
To start testing, open a terminal and type “tlssled URL port“. It will start to test the certificate to
find data.
You can see from the finding that the certificate is valid until 2018 as shown in green in the
following screenshot.
w3af
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 20/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
w3af is a Web Application Attack and Audit Framework which aims to identify and exploit all web
application vulnerabilities. This package provides a Graphical User Interface (GUI) for the
framework. If you want a command-line application only, install w3af-console.
The framework has been called the “metasploit for the web”, but it’s actually much more as it also
discovers the web application vulnerabilities using black-box scanning techniques. The w3af core
and its plugins are fully written in Python. The project has more than 130 plugins, which identify and
exploit SQL injection, cross-site scripting (XSS), remote file inclusion and more.
Step 1 − To open it, go to Applications → 03-Web Application Analysis → Click w3af.
Step 2 − On the “Target” enter the URL of victim which in this case will be metasploitable web
address.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 21/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
Step 4 − Go to “Results” and you can see the finding with the details.
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 22/23
10/02/2021 Kali Linux - Website Penetration Testing - Tutorialspoint
https://www.tutorialspoint.com/kali_linux/kali_linux_website_penetration_testing.htm 23/23