Skip to content

Commit 624c283

Browse files
committed
WEB-126 some additional grammer cleanup
1 parent 0ab1d9a commit 624c283

File tree

2 files changed

+32
-40
lines changed

2 files changed

+32
-40
lines changed

src/main/webapp/lesson_plans/English/HowToWork.html

Lines changed: 14 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,33 +6,28 @@ <h1>How To Work With WebGoat</h1>
66
<h2>Environment Information</h2>
77
<p>
88
WebGoat uses the Apache Tomcat server but can run in any application server. It is configured to run on
9-
localhost although this can be easily changed. </p>
9+
localhost although this can be easily changed, see the ""Tomcat Configuration"" section in the Introduction. </p>
1010

1111
<h2>The WebGoat Interface</h2>
1212
<p>
1313
<img src="images/introduction/interface.png"><br><br>
14-
1. These are Lesson Categories in WebGoat. Click on a Category to see all Lessons in it.<br>
14+
1. Lesson Categories in WebGoat. Click on a Category to see specific Lessons.<br>
1515
2. This will show the underlying Java source code.<br>
1616
3. This will show the complete solution of the selected lesson.<br>
1717
4. This will show goals and objectives of the lesson.<br>
1818
5. This will show technical hints to solve the lesson.<br>
19-
6. This will show the HTTP request data<br>
19+
6. This shows the HTTP request data<br>
2020
7. If you want to restart a lesson you can use this link.</p>
2121
<h2>Solve The Lesson</h2>
2222
<p>
23-
Always start with the lessons plan. Then try to solve the lesson and if necessary,
23+
Always start with the lesson plan. Then try to solve the lesson and if necessary,
2424
use the hints. The last hint is the solution text if applicable. If you cannot solve the lesson using the hints, you may view the
2525
solution for complete details.</p>
26-
<h2>Read And Edit Parameters</h2>
27-
<p>
28-
To read and edit Parameters you need a local proxy to intercept the HTTP request.
29-
Here we use OWASP ZAP. More information on ZAP can be found in the "Useful Tools" Chapter.
30-
</p>
31-
<h2>Read And Edit Cookies</h2>
32-
<p>
33-
Often it is not only necessary to change the value of the parameters but to change the value of cookies.
34-
OWASP ZAP has functionality for this as well.
3526

27+
<h2>Read And Edit Parameters/Cookies</h2>
28+
<p>
29+
To read and edit parameters and cookies you need a local proxy like OWASP ZAP to intercept the HTTP request.
30+
More information on ZAP can be found in the "Useful Tools" section in the Introduction.
3631
</p>
3732

3833
<h2>Configuring new WebGoat users</h2>
@@ -54,17 +49,17 @@ <h2>Configuring new WebGoat users</h2>
5449
</p>
5550
<h2>Adding Users</h2>
5651
<p>
57-
Usually using WebGoat you just use the user guest with the password guest.
58-
But maybe in laboratory you have made a setup with one server and a lot of
59-
clients. In this case you might want to have a user for every client
60-
and you have to alter /WEB-INF/spring-security.xml as the users are stored there. <b>We recommend not to use real passwords
52+
Usually WebGoat only requires logging in with the user:guest and password:guest.
53+
But maybe in laboratory you have made a setup with one server and a lot of
54+
clients. In this case you might want to have a user for every client,
55+
you will have to alter /WEB-INF/spring-security.xml to add additional users. <b>We recommend not to use real passwords
6156
as the passwords are stored in plain text in this file!</b>
6257
</p>
63-
<h3>Add User</h3>
58+
<h3>Adding a new User</h3>
6459
<p>
6560
Adding a user is straight forward. You can use the guest entry as an example. The added
6661
users should have the same role as the guest user. The new user/password will not show on the login page.
67-
Add lines like this to the file:
62+
Add lines like this to the /WEB-INF/spring-security.xml file:
6863
</p>
6964
<pre>
7065
&lt;user name="guest2" password="guest2" authorities="ROLE_WEBGOAT_USER" /&gt;

src/main/webapp/lesson_plans/en/UsefulTools.html

Lines changed: 18 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -2,29 +2,25 @@
22
<!-- Start Instructions -->
33
<h1>Useful Tools</h1>
44
<p>
5-
Below is a list of tools we've found useful in solving the WebGoat lessons. You will need WebScarab or Paros to solve most of the lessons. </p>
6-
<h2>WebScarab:</h2>
5+
Below is a list of tools we've found useful in solving the WebGoat lessons. You will need a proxy like OWASP ZAP or Paros to solve most of the lessons. </p>
6+
<h2>OWASP ZAP:</h2>
77
<p>
8-
Like WebGoat, WebScarab is a part of OWASP.
9-
WebScarab is a proxy for analyzing applications that
10-
communicate using the HTTP and HTTPS protocols. Because WebScarab
11-
operates as an intercepting proxy, we can review and modify requests
12-
and responses.<br><br>
13-
<img src="images/introduction/webscarab.jpg"><br><br>
14-
Webpage:<a href="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project">http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project</a>
8+
Like WebGoat, Zed Attack Proxy (ZAP) is a part of OWASP and is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
9+
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
10+
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually..<br><br>
11+
<img src="images/introduction/UsefulTools-ZAP.png"><br><br>
12+
Webpage: <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project">https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project</a>
13+
<br>The .jar install file can be found at the <a href="http://code.google.com/p/zaproxy/wiki/Downloads?tm=2">OWASP ZAP Google Code Project</a></p>
14+
<p>After installing ZAP and configuring your browser to use it as a proxy on localhost we can start. To intercept a request,
15+
click the green arrow icon turning it red. If we browse a WebGoat page, ZAP will intercept the HTTP request.
16+
Here we can read and edit the intercepted parameters and headers. After editing is complete press the play icon to submit the request to the server.<br>
17+
<img src="images/introduction/UsefulTools-ZAP_1.png"><br><br>
1518
</p>
16-
<h2>Firebug:</h2>
19+
<h2>Modern Browsers:</h2>
1720
<p>
18-
Firebug is an add-on for the Firefox browser. We can use it to inspect, edit and monitor CSS, HTML and JavaScript.<br><br>
19-
<img src="images/introduction/firebug.jpg"><br><br>
20-
Webpage:<a href="http://www.getfirebug.com" target="_blank">http://www.getfirebug.com</a>
21+
Most modern browser have developer tools that will allow you to inspect and modify request data.
2122
<br><br>
22-
<h2>IEWatch:</h2>
23-
<p>
24-
IEWatch is a tool to analyze HTTP and HTML for users of the Internet Explorer.<br><br>
25-
<img src="images/introduction/iewatch.jpg"><br><br>
26-
Webpage:<a href="http://www.iewatch.com" target="_blank">http://www.iewatch.com</a>
27-
</p>
23+
2824
<h2>Wireshark</h2>
2925
<p>
3026
Wireshark is a network protocol analyzer. You can sniff network traffic and gather useful
@@ -34,11 +30,12 @@ <h2>Wireshark</h2>
3430

3531
</p>
3632

37-
<h2>Scanner:</h2>
33+
<h2>Scanners (Attacking Proxies):</h2>
3834
<p>
39-
There are many vulnerability scanners for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Below are links to two open source scanner. <br><br>
35+
There are many vulnerability scanners for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Below are links to three open source scanners. <br><br>
4036
Nessus:<a href="http://www.nessus.org" target="_blank">http://www.nessus.org</a><br>
4137
Paros:<a href="http://www.parosproxy.org" target="_blank">http://www.parosproxy.org</a><br>
38+
OWASP ZAP:<a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project" target="_blank">https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project</a><br>
4239
</p>
4340
<!-- Stop Instructions -->
4441
<br>

0 commit comments

Comments
 (0)