Lab Overview

This intermediate-level lab focuses on web application security testing, covering everything from basic vulnerability scanning to advanced exploitation techniques. You'll work with both modern and legacy web applications to understand common vulnerabilities and their remediation.

๐Ÿ” Professional Insight

While this lab provides hands-on practice, real-world web application security requires professional expertise. For organizations in Portugal seeking professional web application security assessments, Pentesting.pt offers comprehensive testing services following industry best practices.

Lab Environment Options

  • ๐Ÿš€ Recommended: Deploy on DigitalOcean for instant setup
  • ๐Ÿ’ป Resources: Basic Droplet with 4GB RAM sufficient
  • ๐Ÿ”„ Scaling: Easy scaling for multiple web apps
  • ๐ŸŒ Network: Built-in DDoS protection

Learning Objectives

๐ŸŽฏ Target Application

SecureShop E-commerce Platform

  • Application Type: Multi-tier e-commerce platform
  • Technologies: PHP/MySQL backend, React frontend
  • Features: User registration, product catalog, shopping cart, payment processing
  • API Endpoints: RESTful API with JSON responses
  • Authentication: Session-based and JWT tokens
  • File Upload: Profile pictures and product images

๐Ÿ› ๏ธ Required Tools

Proxy Tools

  • Burp Suite Professional: Primary testing platform
  • OWASP ZAP: Alternative free option
  • Caido: Modern security testing tool
  • mitmproxy: Command-line proxy

Specialized Tools

  • SQLMap: SQL injection automation
  • XSStrike: Advanced XSS detection
  • Commix: Command injection testing
  • Wfuzz: Web application fuzzer

Reconnaissance Tools

  • Gobuster: Directory enumeration
  • Nikto: Web vulnerability scanner
  • Whatweb: Technology fingerprinting
  • Arjun: HTTP parameter discovery

๐Ÿ“‹ Lab Scenarios

Phase 1: Reconnaissance & Mapping

Comprehensive application discovery and technology identification.

  • Application fingerprinting and technology stack identification
  • Directory and file enumeration
  • API endpoint discovery
  • Input vector identification

Phase 2: Authentication Testing

Comprehensive authentication and session management testing.

  • Username enumeration
  • Password policy analysis
  • Session management vulnerabilities
  • Multi-factor authentication bypass

Phase 3: Injection Attacks

Comprehensive testing of all injection vulnerability types.

  • SQL injection (Union, Boolean, Time-based)
  • NoSQL injection testing
  • Command injection exploitation
  • LDAP and XPath injection

Phase 4: Client-Side Attacks

Cross-site scripting and other client-side vulnerabilities.

  • Reflected XSS exploitation
  • Stored XSS with maximum impact
  • DOM-based XSS in modern frameworks
  • CSRF attack implementation

Phase 5: Business Logic & Advanced

Complex vulnerabilities requiring deep application understanding.

  • Business logic bypass
  • Race condition exploitation
  • File upload vulnerabilities
  • API security testing

Real-World Application: These scenarios are based on real vulnerabilities commonly found in production environments. For professional web application security assessments in Portugal, consider Pentesting.pt's specialized web application testing services.

๐ŸŽฏ Detailed Attack Scenarios

Scenario 1: SQL Injection Deep Dive

Objective: Exploit SQL injection to gain admin access and extract sensitive data.

Tasks

  1. Identify injection points using manual testing
  2. Determine database type and version
  3. Extract database schema information
  4. Dump user credentials and sensitive data
  5. Achieve code execution via SQL injection

Expected Vulnerabilities

  • Union-based SQL injection in search function
  • Boolean-based blind SQLi in login
  • Time-based blind SQLi in product filtering
  • Second-order SQLi in user profile

Scenario 2: Cross-Site Scripting Exploitation

Objective: Exploit XSS vulnerabilities to compromise user sessions and admin accounts.

Tasks

  1. Identify all XSS injection points
  2. Bypass XSS filters and WAF protection
  3. Craft payloads for session hijacking
  4. Implement keylogger via stored XSS
  5. Achieve admin account compromise

Advanced Techniques

  • Filter bypass using encoding
  • CSP bypass techniques
  • DOM-based XSS in React components
  • XSS to RCE escalation

Scenario 3: File Upload Exploitation

Objective: Exploit file upload functionality to achieve remote code execution.

Tasks

  1. Analyze file upload restrictions
  2. Bypass file type validation
  3. Upload web shell for code execution
  4. Exploit path traversal in uploads
  5. Achieve full system compromise

Bypass Techniques

  • MIME type manipulation
  • Double extension bypass
  • Null byte injection
  • Magic number spoofing

Scenario 4: API Security Testing

Objective: Assess REST API security and exploit API-specific vulnerabilities.

Tasks

  1. Enumerate all API endpoints
  2. Test authentication mechanisms
  3. Exploit IDOR in API responses
  4. Test rate limiting and abuse API limits
  5. JWT token manipulation

API Vulnerabilities

  • Broken authentication
  • IDOR in user data access
  • Mass assignment vulnerabilities
  • JWT signature bypass

๐Ÿ”ง Advanced Testing Techniques

Manual Testing Methodology

  • Parameter manipulation and fuzzing
  • HTTP method tampering
  • Header injection attacks
  • Race condition testing

Automation Integration

  • Custom Burp extensions
  • Python scripting for automation
  • SQLMap advanced usage
  • Custom payload generation

Modern Web Security

  • Content Security Policy bypass
  • CORS misconfiguration
  • WebSocket security testing
  • GraphQL security assessment

๐Ÿ“Š Vulnerability Assessment

Expected Findings

The lab contains the following vulnerability categories:

  • ๐Ÿ”ด Critical: SQL injection leading to data extraction (CVSS 9.0+)
  • ๐ŸŸ  High: File upload RCE, stored XSS (CVSS 7.0-8.9)
  • ๐ŸŸก Medium: IDOR, authentication bypass (CVSS 4.0-6.9)
  • ๐Ÿ”ต Low: Information disclosure, CSRF (CVSS 0.1-3.9)
  • ๐Ÿ“‹ Informational: Missing security headers, verbose errors

๐Ÿ“ Professional Reporting

Security Assessment Report

Your final deliverable should include a comprehensive security assessment report.

Report Structure

  1. Executive Summary
  2. Testing Methodology
  3. Vulnerability Findings
  4. Risk Assessment
  5. Remediation Recommendations
  6. Technical Appendices

Evidence Requirements

  • Screenshots of exploitation
  • Proof-of-concept code
  • HTTP request/response pairs
  • Impact demonstration

๐Ÿ’ก Pro Testing Tips

Expert Web Application Testing Techniques

  • ๐ŸŽฏ Methodology First: Follow structured testing approach
  • ๐Ÿ” Manual + Automated: Combine both approaches effectively
  • ๐Ÿ“ Document Everything: Keep detailed notes and screenshots
  • โšก Chain Exploits: Combine multiple vulnerabilities
  • ๐Ÿงช Test Edge Cases: Focus on unusual input combinations
  • ๐ŸŽญ Business Logic: Understand application purpose
  • ๐Ÿ”„ Iterative Testing: Re-test after each finding
  • ๐Ÿšจ Impact Assessment: Clearly demonstrate business impact

๐ŸŽ“ Knowledge Validation

Post-Lab Assessment Questions

  1. What is the difference between stored and reflected XSS?
  2. How would you identify second-order SQL injection?
  3. What are the key differences between CSRF and SSRF?
  4. How can you bypass file upload restrictions?
  5. What is IDOR and how is it different from privilege escalation?
  6. How does JWT token manipulation work?
  7. What are the main differences between GraphQL and REST API security?
  8. How would you test for race conditions in web applications?

๐Ÿš€ Next Steps

Advanced Topics

  • Mobile application security
  • API security deep dive
  • Cloud application testing
  • DevSecOps integration

Certification Preparation

  • eWPT (Web Penetration Tester)
  • BSCP (Burp Suite Certified)
  • GWEB (GIAC Web Application)
  • OSWE (Offensive Security Web Expert)

Tools Mastery

  • Advanced Burp Suite usage
  • Custom extension development
  • Automation scripting
  • Modern testing frameworks

๐ŸŽฏ Lab Completion Checklist

Verify your progress: Ensure you've completed all testing phases.

Estimated Time: 6-8 hours for complete assessment

โ† Back to Lab Setup

Frequently Asked Questions

What is the Web Application Lab?

A hands-on environment to practice web application security testing, including OWASP Top 10 vulnerabilities.

What skills can I develop here?

You will learn to exploit web vulnerabilities, understand web security concepts, and improve pentesting skills.

Who should use this lab?

Anyone interested in web application security, penetration testing, or ethical hacking.

Subscribe for Cybersecurity Updates

Get the latest roadmaps, labs, and resources straight to your inbox.