Kamis, 23 Juni 2011


WebGoat is a deliberately vulnerable Web application, now including helpful hints and videos to guide you into hacking it. 

=> Instal Java or download at http://java.com
=> Insatall Apache Tomcat or download at http://tomcat.apache.org/  
=> Download the WebGoat at here
=> extract it using command :
   p7zip -d WebGoat-OWASP_Standard-5.3_RC1.7z





=> run it using command :
   ./webgoat srart80   > using port 80
   ./webgoat srart8080 > using port 8080
=> for example..
root@bt:/pentest/web/webgoat# ./webgoat.sh start80
Using CATALINA_BASE:   ./tomcat
Using CATALINA_HOME:   ./tomcat
Using CATALINA_TMPDIR: ./tomcat/temp
Using JRE_HOME:        /usr/lib/jvm/java-6-openjdk/bin/../
Using CLASSPATH:       ./tomcat/bin/bootstrap.jar

  Open http://127.0.0.1/WebGoat/attack
  Username: guest
  Password: guest
  Or try http://guest:guest@127.0.0.1/WebGoat/attack

Jun 24, 2011 12:01:36 PM org.apache.coyote.http11.Http11BaseProtocol start
INFO: Starting Coyote HTTP/1.1 on http-127.0.0.1-80
Jun 24, 2011 12:01:36 PM org.apache.jk.common.ChannelSocket init
INFO: JK: ajp13 listening on /0.0.0.0:8009
Jun 24, 2011 12:01:36 PM org.apache.jk.server.JkMain start
INFO: Jk running ID=0 time=0/18  config=null
Jun 24, 2011 12:01:36 PM org.apache.catalina.storeconfig.StoreLoader load
INFO: Find registry server-registry.xml at classpath resource
Jun 24, 2011 12:01:36 PM org.apache.catalina.startup.Catalina start
INFO: Server startup in 1086 ms
 
LET'S ROCK N ROLL....!!! 

0 komentar:

Posting Komentar