Authentication Bypassing Using WebGoat and BurpSuite
Authentication Bypassing Using WebGoat and BurpSuite
Authentication Bypassing Using WebGoat and BurpSuite
Setup Environment
➔ Open VS Code in your project folder and start a new terminal in VS code.
Type:
docker pull webgoat/webgoat-8.0
docker run -p 8881:8080 -t webgoat/webgoat-8.0
(Your WebGoat will be running on port 8881. Access URL is-
127.0.0.1:8881/WebGoat/login)
Register a new user with username and password & agree to the terms
and conditions.
If you have done ever steps up untill now smoothly, you will have your
WebGoat running on your web browser and get to see this page.
➔ Download the community edition of the Brup Suite and run it as default.
When you will start burp suit, keep every prompt as it is and just click
“next” & “start burp” until you see this page:
(https://portswigger.net/burp/communitydownload)
2. Scanning and Enumeration
➔ Open Burp Suite and go to Proxy section and click on Open browser:
➔ Turn on “Intercept” and write the url on proxy browser to access WebGoat
login page:
➔ From “Docker ps” command we can see the WebGoat container is
runnning on 0.0.0.0:8881 ip address and port. That means it can be run
from your local host IP address (Loopback IP & Private IP). You can
access the WebGoat is both ways:
127.0.0.1:8881/WebGoat/login
<Private_IP_of_host>:8881/WebGoat/login
From the intercept panel you can also verify the IP address of WebGoat.
(Loopback & Private IP)
3. Exploitation
Scroll down and fill in the information on the 2 boxes and click submit.
Remember to keep on the intercept button in burp suite.
➔ Click on the forward button in burp suite untill you see this portion:
➔ Now modify the names of “secQuestion0 & secQuestion1” into
“secQuestion2 & secQuestion3” and click on the Forward button.
➔ Go to the proxy browser and you will see that you have successfully
authenticated as yourself.