< Return to Video

TryHackMe Introduction to OWASP ZAP Walkthrough

  • 0:01 - 0:04
    hello and welcome back to red blue Labs
  • 0:04 - 0:05
    today's video is gonna be a little bit
  • 0:05 - 0:06
    different than the ones I've done in the
  • 0:06 - 0:08
    past where I'm actually am going to be
  • 0:08 - 0:11
    doing a walk through on a try hack me
  • 0:11 - 0:14
    room the room of choice for me today is
  • 0:14 - 0:18
    actually introduction to owasp zap and I
  • 0:18 - 0:20
    chose this room because I personally
  • 0:20 - 0:24
    really enjoy zap I like
  • 0:24 - 0:27
    the the features that it has and when I
  • 0:27 - 0:30
    read this paragraph here
  • 0:30 - 0:31
    um apparently the person who made this
  • 0:31 - 0:33
    room prefers it over burp and honestly
  • 0:33 - 0:35
    it's a it's a personal preference kind
  • 0:35 - 0:38
    of thing many many people use burp some
  • 0:38 - 0:40
    people use zap I'm one of those people
  • 0:40 - 0:43
    that use zap regularly
  • 0:43 - 0:46
    just a heads up I do plan on editing
  • 0:46 - 0:48
    this video so it's gonna be
  • 0:48 - 0:51
    fairly fluid and as I walk through
  • 0:51 - 0:54
    things so there you go now you know
  • 0:54 - 0:56
    if you're if you're not familiar with
  • 0:56 - 1:01
    what zap is it's a proxy where you have
  • 1:01 - 1:04
    your browser pointing to a proxy server
  • 1:04 - 1:06
    that's running locally so maybe on your
  • 1:06 - 1:09
    Cali machine and then you will
  • 1:09 - 1:11
    go on to the website so you're sending
  • 1:11 - 1:13
    traffic through the proxy over the
  • 1:13 - 1:16
    website and in the website is going to
  • 1:16 - 1:17
    go through the proxy back to you so
  • 1:17 - 1:19
    you've got like a a person in the middle
  • 1:19 - 1:22
    that's handling that traffic and then
  • 1:22 - 1:24
    while that traffic's being handled you
  • 1:24 - 1:26
    can actually manipulate the data
  • 1:26 - 1:29
    so let's go ahead and start arm remove I
  • 1:29 - 1:31
    gotta join the room and start that
  • 1:31 - 1:33
    machine
  • 1:35 - 1:36
    and we're going to start off with the
  • 1:36 - 1:40
    first one so zap stands for
  • 1:40 - 1:43
    Zed attack proxy
  • 1:43 - 1:45
    whoo
  • 1:45 - 1:47
    day 148.
  • 1:47 - 1:50
    so let's see if I can do that right now
  • 1:50 - 1:52
    still waiting 18 seconds
  • 1:52 - 1:54
    task one is done
  • 1:54 - 1:56
    go to task two
  • 1:56 - 1:58
    zap is a great tool that's totally slept
  • 1:58 - 2:01
    on you know that is
  • 2:01 - 2:02
    totally true
  • 2:02 - 2:05
    go ahead and give this section A read
  • 2:05 - 2:09
    I've read the task
  • 2:12 - 2:14
    installation
  • 2:14 - 2:17
    okay so I've actually already gone ahead
  • 2:17 - 2:19
    and done that
  • 2:19 - 2:21
    there's uh there's a couple ways you can
  • 2:21 - 2:24
    do it uh they've got the the tool right
  • 2:24 - 2:25
    here so
  • 2:25 - 2:26
    pretty straightforward just go to the
  • 2:26 - 2:29
    website and connect it into your Cali
  • 2:29 - 2:31
    and go ahead and just download it I
  • 2:31 - 2:33
    already have it installed so and that's
  • 2:33 - 2:34
    that was an easy
  • 2:34 - 2:36
    completed
  • 2:36 - 2:39
    and then open it up
  • 2:39 - 2:42
    let's go over my machine
  • 2:44 - 2:46
    and I
  • 2:46 - 2:48
    open it up
  • 2:51 - 2:53
    hit the Windows button or the command
  • 2:53 - 2:56
    button zap
  • 2:58 - 3:00
    powered on
  • 3:04 - 3:07
    eventually your zap will turn on and you
  • 3:07 - 3:09
    are ready to proceed with the rest of
  • 3:09 - 3:10
    the room
  • 3:10 - 3:14
    let's go check out task four
  • 3:15 - 3:17
    and on this task looks like we're doing
  • 3:17 - 3:22
    a automate automated scan let's let's go
  • 3:22 - 3:23
    ahead and run the command that it's
  • 3:23 - 3:26
    asking for
  • 3:29 - 3:33
    set up the Ajax spider looks like in
  • 3:33 - 3:34
    Task 5 we are actually going to be doing
  • 3:34 - 3:37
    some manual scanning and we need to have
  • 3:37 - 3:40
    our browser pointing to our Zapped proxy
  • 3:40 - 3:42
    so there's a there's a number of steps
  • 3:42 - 3:44
    to do this and actually
  • 3:44 - 3:47
    what will make this easier is in the
  • 3:47 - 3:49
    drop down that you see right now I
  • 3:49 - 3:50
    actually have a video that I've made
  • 3:50 - 3:52
    where
  • 3:52 - 3:54
    I actually go through this entire
  • 3:54 - 3:58
    process so I'm gonna skip ahead and if
  • 3:58 - 3:59
    you already have this set up and that's
  • 3:59 - 4:01
    great or if you want to watch that video
  • 4:01 - 4:05
    that I've made go ahead and do that
  • 4:05 - 4:09
    what IP do we use for the proxy well we
  • 4:09 - 4:12
    would be pointing it to ourselves so
  • 4:12 - 4:17
    that could be localhost or I bet it's
  • 4:18 - 4:23
    this one right over here finger Bango
  • 4:23 - 4:25
    with task six it looks like we are doing
  • 4:25 - 4:27
    scanning an authenticated web
  • 4:27 - 4:29
    application so
  • 4:29 - 4:32
    in THM here they give us some some
  • 4:32 - 4:35
    credentials that we need to use on the
  • 4:35 - 4:37
    machine that they've got for us so let's
  • 4:37 - 4:41
    go down and give the page here a read
  • 4:41 - 4:44
    and we are going to
  • 4:44 - 4:47
    open up our browser on our Cali machine
  • 4:47 - 4:48
    here
  • 4:48 - 4:50
    and here we go we've got our
  • 4:50 - 4:52
    spot here
  • 4:52 - 4:55
    to authenticate
  • 4:55 - 4:56
    they're going to put in the credentials
  • 4:56 - 5:00
    that try Hackney has given me
  • 5:00 - 5:03
    and authenticate let's go back and take
  • 5:03 - 5:05
    a peek at the instructions here
  • 5:05 - 5:08
    looks like we have or on the page that
  • 5:08 - 5:11
    we need to be and we need to go down to
  • 5:11 - 5:14
    dvwa security
  • 5:14 - 5:16
    as instructed
  • 5:16 - 5:19
    and just want to do a double check here
  • 5:19 - 5:22
    navigate to that Tab and set the
  • 5:22 - 5:25
    security level to low and then hit
  • 5:25 - 5:26
    submit
  • 5:26 - 5:29
    and after that we're going to pass our
  • 5:29 - 5:32
    authentication token into zap so that we
  • 5:32 - 5:34
    can use the tool to scan authenticated
  • 5:34 - 5:36
    Pages great
  • 5:36 - 5:40
    let's do that
  • 5:42 - 5:44
    low
  • 5:44 - 5:47
    and submit
  • 5:47 - 5:50
    okay
  • 5:52 - 5:54
    so we are going to open up the inspector
  • 5:54 - 5:56
    here
  • 6:08 - 6:10
    for storage
  • 6:10 - 6:14
    and I'm going to grab the session key
  • 6:14 - 6:17
    here
  • 6:17 - 6:20
    foreign
  • 6:30 - 6:33
    open the HTTP sessions tab with the new
  • 6:33 - 6:36
    tab button which is that one there and
  • 6:36 - 6:38
    set and set the authenticated session to
  • 6:38 - 6:40
    active you might actually notice a
  • 6:40 - 6:42
    slight disconnect between what you're
  • 6:42 - 6:44
    seeing in the PHP session right now and
  • 6:44 - 6:46
    what you saw about 10 seconds earlier
  • 6:46 - 6:49
    they do look different and the reason
  • 6:49 - 6:50
    for that is because I actually
  • 6:50 - 6:53
    re-recorded doing this particular task
  • 6:53 - 6:55
    and I wanted to make it pretty
  • 6:55 - 6:58
    straightforward to see how we can see in
  • 6:58 - 7:02
    zap the the exact same session compared
  • 7:02 - 7:04
    to the session that we can see in the
  • 7:04 - 7:07
    inspector of the browser so that's what
  • 7:07 - 7:10
    you're seeing on the screen right now
  • 7:13 - 7:15
    because we have an authenticated session
  • 7:15 - 7:17
    in our
  • 7:17 - 7:20
    zap here we're able to actually do a
  • 7:20 - 7:23
    scan against our Target and receive a
  • 7:23 - 7:26
    lot more information because we are now
  • 7:26 - 7:30
    at this point have an Authentication
  • 7:30 - 7:33
    on the target
  • 7:40 - 7:43
    all right so that was task six and now
  • 7:43 - 7:45
    we're moving on to task seven which is
  • 7:45 - 7:47
    Brute Force directories Let's Open up
  • 7:47 - 7:49
    The Challenge and take a look at what
  • 7:49 - 7:51
    are the requirements here
  • 7:51 - 7:53
    and so essentially we can actually use
  • 7:53 - 7:55
    word lists
  • 7:55 - 7:59
    and zap to do some brute forcing to
  • 7:59 - 8:01
    figure out what kind of directories so
  • 8:01 - 8:04
    some directory enumeration that are on
  • 8:04 - 8:08
    the web server let's go down and when we
  • 8:08 - 8:10
    have our our sites here when we do a
  • 8:10 - 8:13
    right click and we do a forced browse
  • 8:13 - 8:16
    site we can actually do this do
  • 8:16 - 8:18
    directory enumeration I actually have
  • 8:18 - 8:19
    another video where I do the exact same
  • 8:19 - 8:21
    thing so you can see that in the drop
  • 8:21 - 8:23
    down as well if you want to have a
  • 8:23 - 8:25
    specifically on that uh but we're going
  • 8:25 - 8:26
    to do the exact same thing here and it's
  • 8:26 - 8:29
    it's pretty straightforward let's go
  • 8:29 - 8:30
    ahead and
  • 8:30 - 8:32
    do a
  • 8:32 - 8:38
    forced browse on our Target system here
  • 8:51 - 8:54
    and then we just have to pick the the
  • 8:54 - 8:56
    list that we want so I'll use I'll use
  • 8:56 - 8:57
    this one
  • 8:57 - 9:01
    but really word lists are all over the
  • 9:01 - 9:02
    place you can use whatever word list
  • 9:02 - 9:05
    works best for you
  • 9:07 - 9:10
    and hit play
  • 9:13 - 9:18
    task six or task seven complete
  • 9:19 - 9:23
    okay task number eight let's check out
  • 9:23 - 9:25
    what we've got here for Brute Force web
  • 9:25 - 9:27
    login
  • 9:27 - 9:30
    so just like with the Brute Force
  • 9:30 - 9:33
    directories we can actually use Hydra
  • 9:33 - 9:35
    for this as well but what we're doing in
  • 9:35 - 9:36
    this room is demonstrating that we can
  • 9:36 - 9:39
    use zap to do some of the similar tasks
  • 9:39 - 9:40
    as well
  • 9:40 - 9:43
    the what we're going to be doing also is
  • 9:43 - 9:46
    using fuzzing again so let's take a peek
  • 9:46 - 9:47
    at some of the instructions that they
  • 9:47 - 9:51
    give us here so we have a a login so
  • 9:51 - 9:52
    we're going to be demonstrating on The
  • 9:52 - 9:55
    Brute Force part of things and we're
  • 9:55 - 9:59
    going to be doing an attack and fuzz on
  • 9:59 - 10:02
    the spot the moment in time when we are
  • 10:02 - 10:05
    actually inputting the credentials so in
  • 10:05 - 10:06
    here they do
  • 10:06 - 10:10
    find a test one two three and
  • 10:10 - 10:12
    we'll we'll do something similar to that
  • 10:12 - 10:15
    I have my own technique or word that I
  • 10:15 - 10:17
    like to look for and that's fine you'll
  • 10:17 - 10:18
    have you'll have your own that you like
  • 10:18 - 10:19
    as well
  • 10:19 - 10:20
    so we're gonna find the get and we're
  • 10:20 - 10:22
    gonna do a fuzz
  • 10:22 - 10:24
    or at them I actually did all this in a
  • 10:24 - 10:27
    another video so you'll see it in the in
  • 10:27 - 10:28
    this pop down on the screen here
  • 10:28 - 10:31
    now what's unique is that actually Cali
  • 10:31 - 10:34
    comes with its own uh it comes with tons
  • 10:34 - 10:36
    of word lists but it comes with a one
  • 10:36 - 10:38
    called Fast Track I've actually never
  • 10:38 - 10:41
    used Fast Track I use my own word lists
  • 10:41 - 10:44
    um and that's fine too so but for this
  • 10:44 - 10:45
    particular challenge we will be using
  • 10:45 - 10:50
    the Fast Track Dot txt
  • 10:50 - 10:53
    all right let's open up our zap machines
  • 10:53 - 10:55
    and
  • 10:55 - 11:00
    navigate to the HTTP for this so I'm
  • 11:00 - 11:01
    going to do
  • 11:01 - 11:04
    open up my browser here
  • 11:15 - 11:17
    and because my browser is pointing to my
  • 11:17 - 11:21
    proxy server I'm going to see
  • 11:21 - 11:24
    the websites actually populate inside of
  • 11:24 - 11:26
    my sites here and you can see them
  • 11:26 - 11:29
    popping up there right now
  • 11:29 - 11:31
    and according to the instructions on try
  • 11:31 - 11:34
    Hackney we will need to go to Brute
  • 11:34 - 11:36
    Force
  • 11:37 - 11:39
    and at this point that we're going to
  • 11:39 - 11:41
    actually input
  • 11:41 - 11:43
    some data that we're going to catch so
  • 11:43 - 11:45
    we can see it populating here which is
  • 11:45 - 11:47
    great
  • 11:50 - 11:53
    I'm going to actually expand this
  • 11:55 - 11:59
    and we're going to send something to it
  • 11:59 - 12:02
    red blue
  • 12:06 - 12:09
    and then I'm going to hit enter
  • 12:15 - 12:17
    so it says incorrect
  • 12:17 - 12:20
    and that is fine
  • 12:22 - 12:25
    what I like to do actually is knowing
  • 12:25 - 12:28
    because I know that I put red blue in
  • 12:28 - 12:32
    there I actually like to search on that
  • 12:32 - 12:38
    and search for all and then hit enter
  • 12:38 - 12:41
    and I've got a post here we've found the
  • 12:41 - 12:43
    post where
  • 12:43 - 12:45
    my password and name was put in there
  • 12:45 - 12:49
    let's open up resend and you can see my
  • 12:49 - 12:52
    username here and the password there so
  • 12:52 - 12:53
    what we're going to do is actually fuzz
  • 12:53 - 12:57
    on that password there
  • 12:57 - 12:59
    so we've got it selected I'm going to
  • 12:59 - 13:01
    remove that because I just do that every
  • 13:01 - 13:03
    time I'm going to double click and we're
  • 13:03 - 13:07
    going to add the word list that it
  • 13:07 - 13:09
    is recommended so in this case it was
  • 13:09 - 13:11
    fast track
  • 13:11 - 13:15
    you'll find word lists
  • 13:15 - 13:18
    file select
  • 13:18 - 13:20
    Bingo Bango
  • 13:20 - 13:23
    okay
  • 13:23 - 13:24
    add
  • 13:24 - 13:26
    okay
  • 13:26 - 13:28
    options
  • 13:28 - 13:31
    follow redirects
  • 13:33 - 13:37
    and we are going to start the fuzzer
  • 13:45 - 13:50
    and we will investigate each of these
  • 13:50 - 13:53
    reflected
  • 14:05 - 14:07
    we had we had a couple options that were
  • 14:07 - 14:08
    good security
  • 14:08 - 14:13
    and password let's try both of those
  • 14:17 - 14:20
    password
  • 14:25 - 14:29
    so we can see that this one is in fact
  • 14:29 - 14:32
    the password that actually worked when
  • 14:32 - 14:34
    we brute forced it so it's just straight
  • 14:34 - 14:36
    up password
  • 14:37 - 14:39
    there you go so that was
  • 14:39 - 14:43
    brute forcing with web login
  • 14:43 - 14:45
    zap extensions
  • 14:45 - 14:48
    so this app's really cool in that it has
  • 14:48 - 14:49
    a ton of extensions that we can actually
  • 14:49 - 14:52
    add to
  • 14:52 - 14:56
    our our tool and in this page this part
  • 14:56 - 14:57
    here they're actually giving us
  • 14:57 - 14:59
    instructions on where to find some of
  • 14:59 - 15:01
    these tools so I recommend going ahead
  • 15:01 - 15:04
    and actually locating these things and
  • 15:04 - 15:05
    and testing them out if you're enjoying
  • 15:05 - 15:07
    zap then then learn more about these
  • 15:07 - 15:09
    things and maybe you can even build your
  • 15:09 - 15:12
    own scripts that we can add but for try
  • 15:12 - 15:14
    hack me we are
  • 15:14 - 15:17
    happy with knowing that we can do that
  • 15:17 - 15:21
    let's go on to task 10.
  • 15:21 - 15:25
    and it's more documentation than what I
  • 15:25 - 15:28
    I kind of find funny about this
  • 15:28 - 15:29
    um
  • 15:29 - 15:31
    this particular section is that it
  • 15:31 - 15:33
    the the author's like yeah that's pretty
  • 15:33 - 15:35
    much all there is which is which is kind
  • 15:35 - 15:37
    of true is that because burp is so
  • 15:37 - 15:39
    popular it's got so much documentation
  • 15:39 - 15:41
    on it
  • 15:41 - 15:43
    um it's just so widely adopted that zap
  • 15:43 - 15:45
    sort of has been put into the the
  • 15:45 - 15:46
    background
  • 15:46 - 15:47
    but I don't think that should be the
  • 15:47 - 15:49
    case it is actually a pretty cool tool
  • 15:49 - 15:52
    and it's been around a while and it has
  • 15:52 - 15:56
    I just I just I enjoy using sound
  • 15:56 - 15:58
    there you go so we can finish this room
  • 15:58 - 16:02
    with a completed
  • 16:03 - 16:05
    and bingo bango there you go we have
  • 16:05 - 16:09
    finished the introduction to zath
  • 16:09 - 16:12
    room thanks for watching
Title:
TryHackMe Introduction to OWASP ZAP Walkthrough
Description:

more » « less
Video Language:
English
Duration:
16:13

English subtitles

Revisions Compare revisions