Skip to content

Commit

Permalink
Cosmetic changes (#23)
Browse files Browse the repository at this point in the history
Co-authored-by: dfresh <[email protected]>
  • Loading branch information
damianStrojek and dfresh authored Dec 10, 2023
1 parent cf59a88 commit 1b19504
Show file tree
Hide file tree
Showing 10 changed files with 29 additions and 15 deletions.
5 changes: 2 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,15 +22,14 @@ docker run --log-driver=json-file --log-opt max-size=100m --log-opt max-file=3 -

# Check status of your container
docker ps

# Hosting HTTP server on port 80 using python3
python3 -m http.server 80
```

## Usage

The system allows you to set up a web application security testing environment at any time and anywhere. The entire theory and tips on how to perform tasks are included in individual modules. We recommend setting up an environment on [Kali Linux](https://www.kali.org/).

Below is a recording of working system. The main page has been updated in the available release 1.1.

https://github.com/damianStrojek/Security-Testing-of-Web-Applications/assets/67586060/99a952b9-2a8e-400b-aab0-51047e26fd7e

## Advisory
Expand Down
1 change: 1 addition & 0 deletions assets/img/dirbuster.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/img/docker.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/img/hashcat-logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/img/js-logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified assets/img/owasp-logo.png
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/img/php-logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/img/sqlmap-logo-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified assets/img/sqlmap-logo.png
100644 → 100755
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
38 changes: 26 additions & 12 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -190,22 +190,27 @@ <h3 class="page-title white-text teal">Tools</h3>
<h4 class="brown-text light">Tools</h4>
<div class="row text-center">

<div class="col s4 m2">
<img alt="NMAP" src="/assets/img/nmap-logo.png" class="responsive-img" />NMAP
<div class="col s4 m2">
<img alt="John" src="/assets/img/john.png" class="responsive-img" />JOHN THE RIPPER
</div>
<div class="col s4 m2">
<img alt="Burp Suite" src="/assets/img/burp-suite-logo.png" class="responsive-img" />Burp Suite, ZAP
<img alt="Hashcat" src="/assets/img/hashcat-logo.png" class="responsive-img" />HASHCAT
</div>

<div class="col s4 m2">
<img alt="GoBuster" src="/assets/img/gobuster.svg" class="responsive-img" />GoBuster
<img alt="Burp Suite" src="/assets/img/burp-suite-logo.png" class="responsive-img" />BURP SUITE
</div>
<div class="col s4 m2">
<img alt="John" src="/assets/img/john.png" class="responsive-img" />John the Ripper
<img alt="SQLMAP" src="/assets/img/sqlmap-logo.png" class="responsive-img" />SQLMAP
</div>

<div class="col s4 m2">
<img alt="SQLMAP" src="/assets/img/sqlmap-logo.png" class="responsive-img" />SQLMAP
<img alt="DIRBUSTER" src="/assets/img/dirbuster.svg" class="responsive-img" />DIRBUSTER
</div>
<div class="col s4 m2">
<img alt="GoBuster" src="/assets/img/gobuster.svg" class="responsive-img" />GOBUSTER
</div>

</div>
</div>
</div>
Expand All @@ -219,6 +224,15 @@ <h4 class="brown-text light">Other</h4>
<div class="col s4 m2">
<img alt="OWASP" src="/assets/img/owasp-logo.png" class="responsive-img" />OWASP
</div>
<div class="col s4 m2">
<img alt="JS" src="/assets/img/js-logo.png" class="responsive-img" />JAVA SCRIPT
</div>
<div class="col s4 m2">
<img alt="php" src="/assets/img/php-logo.png" class="responsive-img" />PHP
</div>
<div class="col s4 m2">
<img alt="docker" src="/assets/img/docker.png" class="responsive-img" />DOCKER
</div>

</div>
</div>
Expand All @@ -242,7 +256,8 @@ <h3 class="page-title white-text teal">Brute-Force Attacks</h3>
<div class="card-content">
<div class="row text-center">
<div class="col s4 m6" style="margin-top: 6%;">
Following module contains theory behind exploiting a brute-force attack, as well as vulnerable login pages.
This module contains the theory of abusing the brute-force attack, as well as various exercises that try
to show situations that can be encountered in real life, for example, when working as a pentester.
</div>
<div class="col s4 m6">
<a class="module-link" href="./modules/module-1-brute-force/index.html"><img alt="Brute-Force"
Expand Down Expand Up @@ -299,8 +314,8 @@ <h3 class="page-title white-text teal">SQL Injection Attacks</h3>
<div class="card-content">
<div class="row text-center">
<div class="col s4 m6" style="margin-top: 6%;">
Following module contains several types of SQL Injection exploits - each of them is unique and uses different
type of payload.
This module allows you to learn the theory about SQL Injection vulnerabilities and then practice the acquired
knowledge in 3 different exercises.
</div>
<div class="col s4 m6">
<a class="module-link" href="./modules/module-3-sql-injection/index.html"><img
Expand Down Expand Up @@ -328,8 +343,7 @@ <h3 class="page-title white-text teal">XSS Attacks</h3>
<div class="card-content">
<div class="row text-center">
<div class="col s4 m6" style="margin-top: 6%;">
Following module contains several types of Cross-Site Scripting exploits - each of them is unique and uses different
type of payload.
The XSS module allows you to understand how such attacks work and then practice your skills on two example scenarios.
</div>
<div class="col s4 m6">
<a class="module-link" href="./modules/module-4-xss/index.html"><img
Expand Down Expand Up @@ -415,4 +429,4 @@ <h3 class="page-title white-text teal">Contact</h3>
})
</script>
</body>
</html>
</html>

0 comments on commit 1b19504

Please sign in to comment.