infosecgirls
Appsec
Appsec
  • Introduction
  • Application Details
    • VM - Pre-req
    • Import Virtual Machines
    • Access Mutillidae Web Application
  • INITIAL SETUP WITH OWASP ZAP
    • OWASP ZAP
    • Setup OWASP ZAP
    • Modes
    • Automated Scan
    • Report Generation
  • Initial Setup with Burp
    • Start Burp Suite
    • Add FoxyProxy Addon
    • Add New Proxy In FoxyProxy
    • Configure Proxy Listener
    • Install Burp's CA Certificate In Firefox
    • Getting Rid of Unnecessary Browser Traffic
  • Quick Basics
    • Disable Intercept Mode in Burp
    • Enable Intercept Mode in Burp
    • Send to Repeater
    • Send to Comparer
  • Web Application Pentesting
    • A1 - Injection
      • SQL Injection with bWAPP
      • SQL Injection in DVNA
      • Command Injection in DVNA
    • A2 - Broken Authentication
      • Broken Authentication with bWAPP
    • A3 - Sensitive Data Exposure
      • Sensitive Data Exposure - DVNA
    • A4 - XML External Entities (XXE)
      • XML External Entity (XXE) Injection - Mutillidae
      • XML External Entity (XXE) Injection - DVNA
    • A5 - Broken Access Control
      • Broken Access Control - DVNA
    • A6 - Security Misconfiguration
      • Security Misconfiguration in DVNA
      • Security Misconfiguration in Mutillidae
      • Security Misconfiguration in Security Shepherd
    • A7 - Cross-Site Scripting (XSS)
      • Reflected XSS
      • DOM XSS
      • Stored XSS - Mutillidae
      • XSS - Sending data to remote server
    • A8 - Insecure Deserialization
      • Insecure Deserialization - DVNA
    • A9 - Using Components with Known Vulnerabilities
      • Using Components with Known Vulnerabilities - DVNA
    • 10 - Insufficient Logging & Monitoring
    • References
    • About Us
  • Additional Content
    • Insecure Direct Object Reference
    • Security Misconfiguration
    • Password Guessing Attack
    • User Enumeration
      • Unauthenticated User Access
      • Create a New User
      • Authenticated User Access
      • Intruder: Set Positions
      • Intruder: Define Payload
      • Intruder: Configure Grep - Extract
      • Trigger Attack & Save Results
    • Custom Iterator
    • Null Payload
    • Request in Browser: Privilege Escalation Check
  • Burp Extenders
    • Target
    • Proxy
    • Intruder
    • Repeater
    • Sequencer
    • Decoder
    • Comparer
    • Extender
Powered by GitBook
On this page
  • Pre-requisites for the training
  • If you are getting the network adapter error, Please change the VM setting to Bridge Mode in your Network settings.

Was this helpful?

  1. Application Details

VM - Pre-req

PreviousApplication DetailsNextImport Virtual Machines

Last updated 4 years ago

Was this helpful?

Pre-requisites for the training

Þ Install Virtual Box

Þ Install Virtual Box Extension Pack

Þ Download the Test Virtual Machine

Þ Download OWASP Broken Web Application (bwa) - Optional

Þ Download Kali Linux Based on your Operating System

Þ OWASP Zed Attack Proxy Project (or use from kali)

Þ Download Burp Suite

Steps to execute the Test Virtual Machine

1. Open Virtual Box.

2. Click on "File" > "Import Appliance"

3. Select the OVA file named as "Global_Appsec_SanF.ova".

4. Import the OVA file by clicking on "Import" button.

5. You should see the virtual machines named as "Global_Appsec_SanF.ova".

If you are getting the network adapter error, Please change the VM setting to Bridge Mode in your Network settings.

Please click on Change Network Setting and Click ok -> The VM Should start.

Note: Do not change here anything.

https://www.virtualbox.org/wiki/Downloads
All supported platforms
https://drive.google.com/drive/folders/1_NOESvsuBRsUqKpAAicUNIZggfQPOE_B?usp=sharing
https://www.vulnhub.com/entry/owasp-broken-web-applications-project-12,46/
https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
https://portswigger.net/burp