Penetration-Testing | Virtual scenario for Network Penetration Testing | Security Testing library
kandi X-RAY | Penetration-Testing Summary
kandi X-RAY | Penetration-Testing Summary
This repository provides a virtual scenario of Penetration Testing to explore vulnerabilities. Demo scenario has been created using Virtual Networks over linuX (VNX).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of Penetration-Testing
Penetration-Testing Key Features
Penetration-Testing Examples and Code Snippets
Community Discussions
Trending Discussions on Penetration-Testing
QUESTION
I don't have much experience of penetration testing, but I am currently looking at OWASP Zap.
The website I am going to pentest runs on an Amazon EC2 instance. Amazon seems to have certain requirements when it comes to security testing: https://aws.amazon.com/security/penetration-testing/
The above website says that you can run security tests on a Amazon EC2 instance but not certain ones such as DNS zone walking, DoS, etc. which is fair enough.
The problem is that I can't see exactly what OWASP Zap will do when I click the "Attack" button and I obviously don't want to upset AWS!
Has anyone else used OWASP Zap on an EC2 instance? Did it you have to configure it to not do DoS attacks, etc? Is there any way I can find out what Zap is doing (I couldn't see anything in the documentation but may have missed something)?
...ANSWER
Answered 2021-Jun-10 at 07:50Yes, I've done that. ZAP does not deliberately attempt DoS attacks (or any other attacks intended to cause damage) but it can still 'take out' insecure or badly configured applications. If you have permission from the website owner then they hopefully wont complain to Amazon and then you'll be ok.
For details of the scan rules ZAP uses see https://www.zaproxy.org/docs/alerts/ - those pages link to the relevant source code so that shpould provide you with more than enough detail ;)
QUESTION
NOTE: For those who did point it out. Yes, the code uses insecure functions shell_exec
with GET
. This is intentional. The script is part a PHP backdoor that I am using as part of the PWK course.
ANSWER
Answered 2019-May-23 at 18:36You're not actually in HTML mode, you're defining a Heredoc string and so can't break in and out of PHP. There are several ways to do this, here are two. Build a variable to insert into the Heredoc:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Penetration-Testing
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page