Attacking Common Applications
Introduction to Attacking Common Applications
Web-based applications are prevalent in most if not all environments that we encounter as penetration testers. During our assessments, we will come across a wide variety of web applications such as Content Management Systems (CMS), custom web applications, intranet portals used by developers and sysadmins, code repositories, network monitoring tools, ticketing systems, wikis, knowledge bases, issue trackers, servlet container applications, and more. It's common to find the same applications across many different environments. While an application may not be vulnerable in one environment, it may be misconfigured or unpatched in the next. An assessor needs to have a firm grasp of enumerating and attacking the common applications covered in this module.
Application Data
Just some of the categories of applications we may come across during a given assessment that we may be able to leverage to gain a foothold or gain access to sensitive data include:
Category
Applications
Joomla, Drupal, WordPress, DotNetNuke, etc.
Apache Tomcat, Phusion Passenger, Oracle WebLogic, IBM WebSphere, etc.
Splunk, Trustwave, LogRhythm, etc.
PRTG Network Monitor, ManageEngine Opmanger, etc.
Nagios, Puppet, Zabbix, ManageEngine ServiceDesk Plus, etc.
JBoss, Axis2, etc.
osTicket, Zendesk, etc.
Elasticsearch, Apache Solr, etc.
Atlassian JIRA, GitHub, GitLab, Bugzilla, Bugsnag, Bitbucket, etc.
Jenkins, Atlassian Confluence, phpMyAdmin, etc.
Oracle Fusion Middleware, BizTalk Server, Apache ActiveMQ, etc.
Common Applications
WordPress
Drupal
Joomla
Tomcat
Jenkins
Splunk
PRTG Network Monitor
osTicket
GitLab
Example One Note structure
An example OneNote (also applicable to other tools) structure may look like the following for the discovery phase:
External Penetration Test - <Client Name>
Scope
(including in-scope IP addresses/ranges, URLs, any fragile hosts, testing timeframes, and any limitations or other relative information we need handy)Client Points of Contact
Credentials
Discovery/Enumeration
Scans
Live hosts
Application Discovery
Scans
Interesting/Notable Hosts
Exploitation
<Hostname or IP>
<Hostname or IP>
Post-Exploitation
<Hostname or IP>
<<Hostname or IP>
Last updated