100% found this document useful (1 vote)
426 views16 pages

Collecting Information About A Target Website Using Firebug

1. The document describes using Firebug to collect information about a target website as part of an information gathering activity for a security assessment. 2. Firebug integrates with Firefox and provides development tools to edit, debug, and monitor CSS, HTML, and JavaScript on web pages live. 3. The objective is to learn how to use Firebug to reveal source code, collect server-side technology information and cookies to identify potential vulnerabilities of the target website.

Uploaded by

Abdullah Mirza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
426 views16 pages

Collecting Information About A Target Website Using Firebug

1. The document describes using Firebug to collect information about a target website as part of an information gathering activity for a security assessment. 2. Firebug integrates with Firefox and provides development tools to edit, debug, and monitor CSS, HTML, and JavaScript on web pages live. 3. The objective is to learn how to use Firebug to reveal source code, collect server-side technology information and cookies to identify potential vulnerabilities of the target website.

Uploaded by

Abdullah Mirza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Exercise 2: Collecting Information About a Target Website

Using Firebug

Scenario

Overview

Firebug integrates with Firefox providing a lot of development tools to edit, debug, and monitor
CSS, HTML, and JavaScript live in any web page.

Lab Scenario

As a part of information gathering activity, you have been asked to collect information on the
target website and extract the source code of the web pages built in HMTL, Java Script, CSS script
etc. This activity may reveal potential vulnerabilities in the web application that can be exploited
later in the security assessment phases. This lab will demonstrate how to reveal source code and
collect information about a target website.

Lab Objectives

The objective of this lab is to help students learn editing, debugging, and monitoring CSS, HTML
and JavaScript, and also obtain server-side technologies and cookies.

Lab Duration: 10 Minutes

1. Click Kali Linux machine.
2. To login into the kali machine type root in the Username and click the Next button.
3. Next type toor in the Password field and click the Sign In button.
4. The Kali Linux desktop appears as shown in the screenshot. Click the Firefox browser
icon from the favourites bar on the left-side.
5. The firefox browser opens, type www.moviescopes.com in the address bar and
press Enter to browse the moviescope website.
6. Click the Firebug add-on on the top-right corner of the Navigation Toolbar to enable
the Firebug control panel.

The Firebug panel appears at the lower end of the screen. By default with Console tab as
shown in the screenshot.

If a firebug prompt appears, click Don't show this message again.


7. Click drop-down node from Security tab under Console. Check only
the Warnings option.

Press F5 on the keyboard to refresh the webpage.


8. Examine the Security tab under the Console section. Under this tab, Firebug displays
all the issues related to the security of the website’s architecture, as shown in the screenshot.

The warning results may vary depending on the websites you access.

The warning returned in the screenshot states that the password fields are present on an
insecure (http://) page.

This vulnerability allows attackers to easily sniff the passwords in plain text.
9. Click the Inspector tab in the Firebug UI. The Inspector section contains two tags: head
and body, which contain scripts and text that might reveal the build of the website.

If you find this section empty, refresh the webpage.

The head and body tags contain information related to the authentication of the username
and password fields, such as the type of input that is to be given in the fields (numbers or
characters, or combination of numbers and characters, etc.) which allows attackers to narrow
down their exploitation techniques.
10. Expand these nodes and observe the script written to develop the webpage.
11. Refer to tabs such as Rules, Computed, Animations and so on in the right pane in
order to observe the script used to design the webpage.
12. The Style Editor tab provides the information of CSS and Script of
the HTML and Java scripts that were used to design the webpage.

Attackers could use these scripts to build a similar website (cloned website) which could be
used to serve malicious purposes such as harvesting the data entered in specific fields.
13. Click DOM (Document Object Model) tab in the Firebug control panel.

This tab contains scripts written in various web technologies such as html5, jQuery, etc. This
allows attackers to perform exploitation techniques on a specific version of a web
application, which leads to expose sensitive information.
14. Click the Network tab in the Firebug control panel.

By default All tab under this section is selected.

This tab displays the GET requests and responses for all the items in the Net section such
as HTML, CSS, etc., along with their size, status, timeline, domain and remote IP.
15. Under the All tab, click a GET request related to moviescopes.

Under the Headers tab, expand the Response Headers node and observe the Server Name


(IIS) and its version, along with the Web Application Framework (ASP.NET) used to
develop the website and its version. By learning this, attackers can target the vulnerabilities
of that specific version in an attempt to exploit the web application.

Attackers can use sniffing techniques to steal the cookies and manipulate them, thereby
hijacking the session of an authenticated user without the need of entering legitimate
credentials.
By gaining the information described in the lab, an attacker can obtain the script related to a web
page, identify the server-side technologies and manipulate the cookies, which allow them to
perform fraudulent activities such as entering the web application, cloning a web page, hijacking
a session, stealing database information , etc.

You might also like