Overview
GlobalComm has hired you as an offensive security consultant. You have been
tasked with writing a penetrating test report against the web application of
GlobalComm – DVWA. The expectation is you use active information gathering
techniques and methods to exploit web applications.
Rules of engagement
• The only computer that should targeted is Metasploitable
• Students must of preformed the lab preparation assignment before
continuing
Tasks and expectations
• Show proficiency Web application security
• Write a response to the tasks and questions below
Technical Questions
For this lab report screenshots of every command is not needed, please use your
judgment when documenting this. Screenshots again should be used but limited. I
do not want 5 pages of screenshots; additionally use the cropping tool to tighten the
screenshots that are used.
Design
Web Application Assessment
The CTO of GlobalComm has requested an in-depth assessment of the Web
Applications running on the Linux virtual machine provided. A report should be
written outlining the risk the current system has and recommendations on how to
resolve them. DVWA should be the focus of the report but feel free to include an
assessment of the other web applications running. Within the report you should
explain the following:
• Information gathering
• Vulnerability identification
• Authentication weaknesses
• Web Application Exploitation
o 4 Exploits should be demonstrated
! 1 SQL injection attack
! 1 attack using SQL Map
! 1 attack using demonstrating a web shell
! 1 attack of choice
o 1 additional Exploit with DVWA in medium will award you 5 bonus
points
• Data exfiltration or disclosure possibilities should be outline and explain the
risk in-depth.
• Remediation steps and action items to resolve issues identified should be
elaborated on.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more