Part 5 Lab Defenses

Video Activity

In this lab-based lesson, participants receive step-by-step instructions in using Web Goat to create a Denial of Service from multiple logins. This is an exercise about exhausting resources and shows how you have limited about of resources and once they become exhausted, a web site an completely deny service to a user. These are a major user in web...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10
Video Description

In this lab-based lesson, participants receive step-by-step instructions in using Web Goat to create a Denial of Service from multiple logins. This is an exercise about exhausting resources and shows how you have limited about of resources and once they become exhausted, a web site an completely deny service to a user. These are a major user in web applications because if a user cannot access their resources, time and money is expended.

Video Transcription
00:04
Hello and welcome to the cyber. Resync your coding course. My name is Sonny Wear, and this is sans Top 25 Risky Resource Management Lab.
00:15
We will be using Web goats denial of service multiple Loggins exercise.
00:21
This is the lab for denial of service, and we'll be using Web goats Denial of service from multiple Loggins
00:30
This exercise is really about exhausting. Resource is,
00:35
it's not so much about the Loggins as it is showing that you have a limited amount of
00:43
resource is on your server or in your application that can get exhausted. And once they do,
00:52
they Kenbrell your website to complete
00:55
denial of availability or denial of service. And so that's what this
01:00
exercises trying to simulate.
01:03
So the instructions tell us that denial of service attacks are a major issue and Web applications. If the end user cannot conduct business or perform the service offered by the Web application, both time and money is wasted.
01:19
Here is our goal. The site you allows a user too long to log in multiple times.
01:26
This site has database connection pool that only allows to connections. Now that's not very realistic,
01:34
but once again for demonstrative purposes, they needed to have a limit
01:40
to the pool that was relatively small. To show that a denial of service would occur,
01:47
you must obtain a list of valid users and create a total of three Loggins.
01:52
Now, the there's differ ways that we could try to go about in numerator ng user names.
01:59
The easiest, of course, is gonna be a sequel injection. So we'll try that first. But just bear in mind we could use if, if there's a particular string that we could grip on, we could actually use the intruder inside of birth. Sweet to do. This is well,
02:15
but let's start with the easy stuff.
02:17
So let's say we have a test
02:23
and we use our tick. Then we're gonna use our or and are one equals one attack.
02:31
And this is always tricky because you're never sure what type of database you you might be going against. So the syntax is always just a little bit different,
02:43
and so we will try this one
02:47
okay, and it is susceptible to
02:51
sequel injection, so we're able to get that list of users.
02:54
So now all we need to do is open to more tabs
03:00
and log in as thes different
03:02
user account. So
03:06
go with J snow.
03:28
Okay, Jay Dough
03:39
and Jay plane.
03:49
Okay,
03:55
okay. And so even though,
03:59
you know, this is just a simulation,
04:01
the purpose was to show you that resource is our limited. And if they're brought to exhaustion, can bring a web application.
04:13
22 It's Steve's and basically make it unavailable to end users.
Up Next