{"id":9696,"date":"2023-02-23T20:17:53","date_gmt":"2023-02-23T14:47:53","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=9696"},"modified":"2023-04-22T07:30:30","modified_gmt":"2023-04-22T07:30:30","slug":"understanding-the-owasp-top-10-how-to-download-and-install-owasp-webgoat-recon-cyber-security-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/understanding-the-owasp-top-10-how-to-download-and-install-owasp-webgoat-recon-cyber-security-cyber-security\/","title":{"rendered":"Understanding the OWASP Top 10 &#038; How to download and install OWASP Webgoat"},"content":{"rendered":"\n<h1 id=\"learn-how-to-set-up-owasp-webgoat-and-owasp-webwolf-with-java-and-docker\" class=\"wp-block-heading\">Learn How to Set Up OWASP Webgoat and OWASP WebWolf with Java and Docker<\/h1>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Welcome to another session in our <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#fa0000\" class=\"has-inline-color\">OWASP Top 10 <\/mark><\/strong><\/a>training series! In today&#8217;s episode, you&#8217;ll be learning how to set up <strong>OWASP Webgoat<\/strong> and <strong>OWASP WebWolf <\/strong>with Java and Docker. As we go through the OWASP Top 10 training, we are gradually assembling our lab to begin honing our skills to exploit these vulnerabilities. Even if you&#8217;re only just joining us now, it&#8217;s not too late &#8211; just follow the steps on the OWASP Zap or Burp Suite set up blog posts, or you can view the OWASP Top 10 video training series. And don&#8217;t worry &#8211; there will be plenty more videos coming your way as we move through the training.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h2 id=\"why-is-this-owasp-top-10-course-using-owasp-webgoat-and-what-is-it\" class=\"wp-block-heading has-black-color has-text-color has-large-font-size\">Why is this OWASP Top 10 course using OWASP Webgoat, and what is it?<\/h2>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">OWASP WebGoat is an insecure web application purposely developed to assist with Java-based application testing against the most prevalent web application vulnerabilities, namely the OWASP Top 10. Along with OWASP WebGoat, the OWASP WebWolf <a href=\"https:\/\/reconcybersecurity.com\/android-penetration-testing-course\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-cyan-blue-color\">application <\/mark><\/strong><\/a>can be used to effectively simulate out-of-band attacks. WebGoat and WebWolf come as jar files, Docker images, and source code, which make them suitable for our OWASP Top 10 training purposes. <\/p>\n\n\n\n<h3 id=\"how-to-set-up-a-safe-environment-for-owasp-webgoat-and-webwolf\" class=\"wp-block-heading\">How to Set Up a Safe Environment for OWASP Webgoat and WebWolf<\/h3>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">As such, this is an excellent way to become knowledgeable in web application hacking and Docker usage for lab set-up. Please bear in mind that this is a deliberately vulnerable web application, so it should never be installed on a host machine. To demonstrate the proper way of setting up a secure lab, I will begin with a Debian 9 Virtual Machine running on Virtualbox, as illustrated in my YouTube video. For now, we will assume that you already have a Debian 9 VM on your preferred virtualization software. I&#8217;m using VirtualBox in my situation.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h2 id=\"how-to-set-up-webgoat-and-webwolf-using-the-jar-for-owasp\" class=\"wp-block-heading has-black-color has-text-color has-large-font-size\">How to set up Webgoat and WebWolf using the JAR for OWASP<\/h2>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">If you want to utilize <a href=\"https:\/\/www.docker.com\/\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">Docker <\/mark><\/strong><\/a>in your OWASP Top 10 learning process, feel free to disregard this portion. I included it here so you would know how to set up Java on your computer. Possessing the ability to install packages is an invaluable aptitude in the process of becoming knowledgeable. It provides the opportunity to explore and experiment with new software, especially with the burgeoning amount of open-source programs released daily.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Setting up Java<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">After establishing a connection with your Debian 9 guest machine, execute the necessary commands. If you experience any difficulties, be sure to consult the <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pale-pink-color\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/\" target=\"_blank\" rel=\"noopener\" title=\"\">blog<\/a><\/mark><\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/1-4.png\" alt=\"\" class=\"wp-image-9697\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Run the OWASP WebGoat program.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/2-4.png\" alt=\"\" class=\"wp-image-9698\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">By default, <em>WebGoat<\/em> can only be accessed from localhost, however, you can configure it to listen on all interfaces by setting the server. address option to 0.0.0.0.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Run the OWASP WebWolf download<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/3-4.png\" alt=\"\" class=\"wp-image-9699\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">How to install Docker&#8217;s OWASP Webgoat<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">When it comes to OWASP Top 10 training and overall hacking exploration, Docker offers plentiful benefits in comparison to a traditional Java environment. Without any additional dependency setup and configuration, one simple command launches both Webgoat and Webwolf. Furthermore, this tool will enable an effortless setup for any other application you might come across.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h2 id=\"setup-docker\" class=\"wp-block-heading has-black-color has-text-color has-large-font-size\">Setup Docker<\/h2>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">I strongly advise against installing Docker using a one-time script as outlined in its documentation. Developing an understanding of the code you are running on your machines is essential. This article is based on the official Docker documentation for Debian and offers the following steps as guidance.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/4-4.png\" alt=\"\" class=\"wp-image-9700\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">You ought to receive an answer along these lines.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/5-4.png\" alt=\"\" class=\"wp-image-9701\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Run OWASP WebGoat for Docker after downloading it.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Execute both WebGoat and WebWolf simultaneously. Pay attention to setting the TZ environment variable correctly to ensure that the JWT challenges are properly functional. The timezone used should be determined by the location of the machine hosting these applications, and the following list of time zones should help with that.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/6-3.png\" alt=\"\" class=\"wp-image-9702\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">OWASP WebGoat testing with our setup<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now that we have launched both OWASP WebGoat and WebWolf, we can test them to ensure that they are compatible with OWASP ZAP or Burp Suite. To do this, open either of these programs and select the FoxyProxy add-on as your proxy. For instructions on installing and configuring FoxyProxy, please follow this link. After this is completed, open up http:\/\/your-machine-ip:8080\/WebGoat, using your machine&#8217;s IP address for &#8216;your-machine-ip.&#8217; If everything went as planned, you should be presented with a login screen similar to the screenshot provided.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/7-3.png\" alt=\"\" class=\"wp-image-9703\"\/><\/figure><\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">OWASP WebWolf configuration being tested<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To get started, launch either OWASP Zap or <a href=\"https:\/\/reconcybersecurity.com\/discover-acunetix-the-essential-ethical-hacking-software-cyber-security-recon-cyber-security\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-purple-color\">BurpSuite<\/mark><\/strong><\/a>, then select your proxy from the FoxyProxy add-on. If you are just joining us, the link to install and configure FoxyProxy can be found below. After everything is in place, you should be able to open http:\/\/your-machine-ip:9090\/WebWolf (where your-machine-ip is the IP address of the Debian 9 VM), and you should be met with a login screen.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/8-4.png\" alt=\"\" class=\"wp-image-9704\"\/><\/figure>\n\n\n\n<p class=\"has-white-color has-text-color has-medium-font-size\">Well done! You&#8217;ve taken another stride in training yourself on the OWASP Top 10 vulnerabilities. In the following episode of the OWASP Top 10 training program, we&#8217;ll be installing and setting up OWASP Juice Shop.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><br>If you liked this tutorial, sign up for the Newsletter to receive notifications from <a href=\"https:\/\/reconcybersecurity.com\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-purple-color\">RECONCYBERSECURITY.COM<\/mark><\/strong><\/a>. In the meantime, stay inquisitive, foster your thirst for knowledge, maintain an ethical approach, and spread the word!<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">For those of you who are fond of YouTube tutorials, I have a whole Owasp Top 10 series waiting for you.<\/p>\n","protected":false},"excerpt":{"rendered":"Learn How to Set Up OWASP Webgoat and OWASP WebWolf with Java and Docker Welcome to another session&hellip;\n","protected":false},"author":1,"featured_media":10689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55,18,241],"tags":[240,277,537,278,538,539,540,541,542,543,544,56,311,545,546,547,57,548],"class_list":{"0":"post-9696","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"category-installations","10":"category-it-knowledge","11":"tag-cyber-security","12":"tag-ethical-hacking","13":"tag-hack","14":"tag-hacking","15":"tag-how-to-set-up-webgoat-and-webwolf-using-the-jar-for-owasp","16":"tag-install-owasp-webgoat","17":"tag-owasp","18":"tag-owasp-testing","19":"tag-owasp-top-10","20":"tag-owasp-top-10-course-using-owasp-webgoat","21":"tag-owasp-webgoat-testing-with-our-setup","22":"tag-phishing-tool","23":"tag-recon-cyber-security","24":"tag-run-the-owasp-webgoat-program","25":"tag-run-the-owasp-webwolf-download","26":"tag-setting-up-java","27":"tag-social-media-hacking","28":"tag-webgoat"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=9696"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9696\/revisions"}],"predecessor-version":[{"id":10959,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9696\/revisions\/10959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10689"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=9696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=9696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=9696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}