Collecting Information About A Target Website Using Firebug
Collecting Information About A Target Website Using Firebug
Using Firebug
Scenario
Overview
Firebug integrates with Firefox providing a lot of development tools to edit, debug, and monitor
CSS, HTML, and JavaScript live in any web page.
Lab Scenario
As a part of information gathering activity, you have been asked to collect information on the
target website and extract the source code of the web pages built in HMTL, Java Script, CSS script
etc. This activity may reveal potential vulnerabilities in the web application that can be exploited
later in the security assessment phases. This lab will demonstrate how to reveal source code and
collect information about a target website.
Lab Objectives
The objective of this lab is to help students learn editing, debugging, and monitoring CSS, HTML
and JavaScript, and also obtain server-side technologies and cookies.
Lab Duration: 10 Minutes
1. Click Kali Linux machine.
2. To login into the kali machine type root in the Username and click the Next button.
3. Next type toor in the Password field and click the Sign In button.
4. The Kali Linux desktop appears as shown in the screenshot. Click the Firefox browser
icon from the favourites bar on the left-side.
5. The firefox browser opens, type www.moviescopes.com in the address bar and
press Enter to browse the moviescope website.
6. Click the Firebug add-on on the top-right corner of the Navigation Toolbar to enable
the Firebug control panel.
The Firebug panel appears at the lower end of the screen. By default with Console tab as
shown in the screenshot.
The warning results may vary depending on the websites you access.
The warning returned in the screenshot states that the password fields are present on an
insecure (http://) page.
This vulnerability allows attackers to easily sniff the passwords in plain text.
9. Click the Inspector tab in the Firebug UI. The Inspector section contains two tags: head
and body, which contain scripts and text that might reveal the build of the website.
The head and body tags contain information related to the authentication of the username
and password fields, such as the type of input that is to be given in the fields (numbers or
characters, or combination of numbers and characters, etc.) which allows attackers to narrow
down their exploitation techniques.
10. Expand these nodes and observe the script written to develop the webpage.
11. Refer to tabs such as Rules, Computed, Animations and so on in the right pane in
order to observe the script used to design the webpage.
12. The Style Editor tab provides the information of CSS and Script of
the HTML and Java scripts that were used to design the webpage.
Attackers could use these scripts to build a similar website (cloned website) which could be
used to serve malicious purposes such as harvesting the data entered in specific fields.
13. Click DOM (Document Object Model) tab in the Firebug control panel.
This tab contains scripts written in various web technologies such as html5, jQuery, etc. This
allows attackers to perform exploitation techniques on a specific version of a web
application, which leads to expose sensitive information.
14. Click the Network tab in the Firebug control panel.
This tab displays the GET requests and responses for all the items in the Net section such
as HTML, CSS, etc., along with their size, status, timeline, domain and remote IP.
15. Under the All tab, click a GET request related to moviescopes.
Attackers can use sniffing techniques to steal the cookies and manipulate them, thereby
hijacking the session of an authenticated user without the need of entering legitimate
credentials.
By gaining the information described in the lab, an attacker can obtain the script related to a web
page, identify the server-side technologies and manipulate the cookies, which allow them to
perform fraudulent activities such as entering the web application, cloning a web page, hijacking
a session, stealing database information , etc.