It will be a completely manual testing and vulnerability discovery.īefore going any further, it is always a good practice to check out all the links and content on the web application. Please note that we won’t be using any vulnerability scanners or crawlers to test the web application. ![]() Copy the WAR file to the “webapps” directory in the Apache Tomcat installation.Now extract the archive of TBS and you will get a WAR (web archive) file, “bodgeit.war.”.Extract the archive of Apache Tomcat to a suitable location.The BodgeIt Store can be downloaded from Google Code.Īt the time of writing this article the available version of TBS was v1.4.0. Note: From here on we will refer to The BodgeIt Store as “TBS.” Installation Reporting of any other vulnerability discovered is welcome. ![]() This vulnerable web application also has a scoring page which lists 12 challenges to complete. Uses HSQLDB as backend database (Sqlmap and Havij won’t work here)
0 Comments
Leave a Reply. |