Application misconfiguration attacks exploit configuration weaknesses found in web applications.
Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, and framework.
Many applications come with unnecessary and unsafe features, such as debug and QA features, enabled by default. These features may provide a means for a hacker to bypass authentication methods and gain access to sensitive information, perhaps with elevated privileges.
Likewise, default installations may include well-known usernames and passwords, hard-coded backdoor accounts, special access mechanisms, and incorrect permissions set for files accessible through web servers.
The version of “Mutillidae” we are using is taken from OWASP’s Broken Web Application Project. Find out how to download, install and use this project.
First, ensure that Burp is correctly configured with your browser.
Ensure Burp Proxy "Intercept is off".
In your browser, visit the page of the web application you are testing.
In this example start by browsing to the Mutillidae home page.
Return to Burp.
Locate and right click on the "Mutillidae" folder to bring up the context menu..
Click "Spider from here".
Although not necessarily a security vulnerability, directory listings are reported by Burp Scanner.
For example, if you have passive scanning enabled when you spider this application, "Directory listing" will be included in the Scanner "Results" tab.
Here you can view the site map for the web application which has been populated by Burp Spider.
Select an interesting branch from the Site map. In this case we will explore the "Includes" directory.
Return to your browser and access the directories you have chosen to investigate by adding the directory name to the URL.
In this example: /mutillidae/includes/.
Explore the links in each file and directory you are able to find.