24 lines
1.2 KiB
Markdown
24 lines
1.2 KiB
Markdown
# DVGM -- Usage and Security Analysis
|
|
|
|
## Introduction / Prerequisites
|
|
|
|
This exercise sheet is meant to be followed on a recent GNU/Linux installation
|
|
and makes use of the terminal. While all necessary commands are provided, a
|
|
basic understanding if its usage is still required.
|
|
|
|
In the following, we will use the Damn Vulnerable Grade Management (DVGM) app as
|
|
a training target. Before continuing, please familiarize yourself with the app
|
|
and ensure that it is listening on `http://$(hostname):3000`, where
|
|
`$(hostname)` is the host name of your machine as returned by the `hostname`
|
|
command. This is important because some scanners have problems when scanning
|
|
loopback addresses such as `localhost` and `127.0.0.1`.
|
|
|
|
If you need to fresh-up your Ruby knowledge, our small [Ruby Primer](ruby-primer.md)
|
|
might be a helpful companion.
|
|
|
|
## Questions / Challenges
|
|
|
|
The folder [exercises](exercises/) contains several exercises that illustrate both manual
|
|
exploration of DVGM and the use of tools such as [Brakeman](https://brakemanscanner.org/),
|
|
[Arachni](http://www.arachni-scanner.com/), and [OWASP ZAP](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project)
|
|
for finding various security vulnerabilities in DVGM. |