24
Orange Web Sec Toolkit. 網網網網網網網網 [email protected]

OWST - Orange Web Security Toolkit Documentation

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: OWST - Orange Web Security Toolkit Documentation

Orange Web Sec Toolkit.網站安全檢測工具[email protected]

Page 2: OWST - Orange Web Security Toolkit Documentation

This was written for educational purpose.We are good person. Don’t be evil :P

Page 3: OWST - Orange Web Security Toolkit Documentation

Web Scanner

Page 4: OWST - Orange Web Security Toolkit Documentation

Web Scanner

Page 5: OWST - Orange Web Security Toolkit Documentation

Web Scanner

• 網站敏感目錄、具有危險性的路徑檢查• 自訂副檔名– 使用 | 分隔

• 自訂失敗的 HTTP status– 301 moved permanently– 302 found

• 自訂失敗的錯誤頁面– NotExists.html

Page 6: OWST - Orange Web Security Toolkit Documentation

Decoder / Encoder

• Text to Hex• Hex to Text• URL Encode / Decode• Base64 Encode /

Decode• MSSQL CHAR()• JavaScript unescape to

C array (for shellcode)

Page 7: OWST - Orange Web Security Toolkit Documentation

Decoder / Encoder

Page 8: OWST - Orange Web Security Toolkit Documentation

SQL Injector

Page 9: OWST - Orange Web Security Toolkit Documentation

SQL Injector

• 自動化判斷注入型態以及資料庫類型

• 可使用 GET / POST

• 目前支援– ACCESS– MYSQL UNION– MYSQL BLIND– MYSQL ERROR BASED– MSSQL BLIND– MSSQL ERROR BASED– ORACLE BLIND– ORACLE ERROR BASED– ORACLE UTL_HTTP

Page 10: OWST - Orange Web Security Toolkit Documentation

SQL Injector

• 網址輸入後可自訂注入型態以及資料庫型態,如不清楚可保持 AUTO 讓程式自動判斷是否存在弱點

• 網址輸入後按下 Start 按鈕即可進行

Page 11: OWST - Orange Web Security Toolkit Documentation

SQL Injector

• 按下 Get Table 可取得所有 Table list

Page 12: OWST - Orange Web Security Toolkit Documentation

SQL Injector

• 選定需要的 Table 打勾後按下 Get Column 可取得所有 Column list

Page 13: OWST - Orange Web Security Toolkit Documentation

SQL Injector

• 選定需要的 Column 打勾後按下 Get data可取得所有欲取得的資料

Page 14: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

Page 15: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• 目前支援– MYSQL load_file– MYSQL into outfile– MSSQL xp_dirtree– MSSQL xp_cmdshell– PHP eval connector– ASP eval/execute connector– Struts2 Code Execution

Page 16: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• MYSQL load_file• 輸入網址以及欲讀取

的檔案按下 Start 即可讀取

• p.s. MYSQL root only

Page 17: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• MYSQL into outfile• 輸入網址以及檔案參

數按下 Start 即可• p.s. MYSQL root only• MAGIC_QUOTE = Off

Page 18: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• egg.php?key=phpinfo();• 成功畫面

Page 19: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• MSSQL xp_dirtree

• p.s. db_owner & sysadmin Only (Pulic will be in next version)

Page 20: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• MSSQL xp_cmdshell

• sysadmin only

Page 21: OWST - Orange Web Security Toolkit Documentation

Advanced SQL Injector

• Struts2 Code Execution

• URL pattern is like http://site/xxx.action

Page 22: OWST - Orange Web Security Toolkit Documentation

Authorization Cracker

• 支援– 401 Authorization– Web Login Form

( 不存在圖形驗證碼 )

Page 23: OWST - Orange Web Security Toolkit Documentation

Settings

Page 24: OWST - Orange Web Security Toolkit Documentation

測試版本中,有錯誤以及建議歡迎回報