Learn about Web Testing Framework Samurai

Samurai Web Testing Framework is a Linux Live environment preconfigured to act as a web pentest environment.

Samurai Web Testing Framework is a Linux Live environment preconfigured to act as a web pentest environment. The CD contains free and open source tools focused on testing and hacking websites. Samurai includes many other tools on this list, such as WebScarab, ratproxy, w3af, Burp Suite and BeEF.

Samurai Web Testing Framework homepage:

 http://www.samurai-wtf.org/ 

Web Testing Framework Samurai - Linux environment for pentest

  • What is the Samurai Web Testing Framework?
  • First look at Samurai
  • Applications
  • Prerequisite for installing Web Testing Framework Samurai
  • Initial installation
  • Provisioning script
  • Some note

What is the Samurai Web Testing Framework?

As live CDs became more popular, specialized distributions began to appear. And Samurai is such a distribution. Samurai is sponsored by IntelGuardians Network Intelligence Inc, an information security consulting firm based in Washington, DC.

Picture 1 of Learn about Web Testing Framework Samurai Picture 1 Learn about Web Testing Framework Samurai download this picture HERE

The Samurai Web Testing Framework is a virtual machine, supported on VirtualBox and VMWare, pre-configured to act as a web pentest environment. When developing this environment, developers have chosen the most common tools used in security.

Tools like Fierce Domain Scanner (Fierce domain scanner) and Maltego are used for reconnaissance. Tools like WebScarab and ratproxy are used for mapping. Later, w3af and burp were used to explore. The final stage, exploit, BeEF, AJAXShell, etc. will be used. The VM also includes a pre-configured wiki, set up to store central information during the pentest process.

Samurai focuses on the tools needed for web application testers to look for common vulnerabilities, such as misconfiguration, cross site scripting (XSS), SQL injection, including remote files and other Other common vulnerabilities. The CD includes a number of tools to rearrange applications and web servers, list files, directories, and many test scripts.

First look at Samurai

Bootable Samurai CD provides a number of options when starting. It can be run as a Live CD or you can install this framework as a complete operating system:

Picture 2 of Learn about Web Testing Framework Samurai Picture 2 Learn about Web Testing Framework Samurai download this picture HERE

The status screen starts quite neatly:

Picture 3 of Learn about Web Testing Framework Samurai Picture 3 Learn about Web Testing Framework Samurai download this picture HERE

When booting Samurai into the login screen, enter the username and password 'samurai' to login. This information is a bit confusing. It appears on the Github Samurai WTF page and in Readme.txt is only available when you log into the distribution:

Picture 4 of Learn about Web Testing Framework Samurai Picture 4 Learn about Web Testing Framework Samurai download this picture HERE

After logging in, it was clear that Samurai was based on Ubuntu, which was a bit unusual for the Live CD distribution:

Picture 5 of Learn about Web Testing Framework Samurai Picture 5 Learn about Web Testing Framework Samurai download this picture HERE

Applications

Samurai comes with a bunch of useful apps. These include many common Linux tools such as:

  • Burp Suite , a web application attack tool
  • DirBuster, a file and directory listing tool, Brute force tool from OWASP
  • Fierce Domain Scanner , a target enumeration utility
  • Gooscan, an automated Google query tool useful for finding CGI vulnerabilities, does not need to directly scan targets, but only queries Google's cache
  • Grendel-Scan, an open source web application vulnerability testing tool
  • HTTP_Print, a tool that retrieves the fingerprint of the web server
  • Maltego CE, an open source application that makes data mining to find information from the Internet, then links them together (useful for basic target research).
  • Nikto, an open source web server scanner
  • Paros, one of Java's favorite proxy and testing tools, is based on the Java platform
  • Rat Proxy, a passive, semi-automated web application security control tool.
  • Spike Proxy , a web application analysis and vulnerability scanning tool.
  • SQLBrute, a Brute force tool and SQL injection.
  • w3af (and GUI), framework that controls and attacks web applications.
  • Wapiti, a web application security control and vulnerability scanner
  • WebScarab, an HTTP application control tool from OWASP
  • WebShag, a web server control tool
  • ZenMap, NMAP graphical interface

In addition, Samurai includes several utilities not available in the GUI menu, including:

  • dnswalk, a roaming and DNS query tool
  • httping, a ping-like utility for HTTP requests
  • httrack, a website cloning utility.
  • john the ripper, a password cracking program
  • netcat, a versatile TCIP / IP tool
  • nmap, a port scanner and OS detection tool
  • siege, an HTTP (pressure) load testing and benchmarking tool.
  • snarf, a lightweight URL fetcher
  • etc .

Of course, all these tools can easily be installed on Linux machines. But having a Live CD with these tools installed and configured is also quite good. Samurai also comes with Wine pre-installed very convenient.

Prerequisite for installing Web Testing Framework Samurai

  • vagrant
  • Virtualization software - Vagrant basic box used to support Virtualbox, VMware and many other similar options
  • Vagrant-vbguest plugin for Vagrant (Virtualbox only) - This plugin will automatically install client extensions, support for higher display resolution, as well as many other utilities like clipboard sharing .

Initial installation

1. Make sure you have the prerequisites listed above.

2. Duplicate this archive.

3. From a command line terminal in the project directory, run the vagrant up command. Then wait for the process to finish. Immediately after the first boot, you should restart using the vagrant reload command. Running the vagrant up command will build the main target, this is the only VM that has both the user environment and the target. You can run vagen up userenv and vagrant up target to build separate virtual machines for that purpose.

NOTE : The Guest VM window will open with CLI while provisioning is ongoing. It is best to let the vagrant up command complete.

Provisioning script

The main Vagrant provisioning script for SamuraiWTF is install/userenv_bootstrap.sh . An independent target provisioning script is included in install/target_bootstrap.sh . Changes to the system, goals, tool settings, or initialization for SamuraiWTF are all handled in these scripts.

Some note

When you load the VM, the username and password are both: samurai .

The menus are available via a right click on the desktop.

When logged in, need to provide the target system. First, load Chrome bookmarks by starting Chrome. Then select the three-dot menu, then click Bookmarks. From the submenu, select Import bookmarks and settings . In the window that opens, select Bookmarks HTML File . A file selection window will open. Select the file chrome_bookmarks.html in Samurai's Home directory.

Some target environments need to be initialized before use. Use their setup links or reset their DB to do this.

Overall, Samurai looks like a great addition to many Live CDs aimed at information security professionals. Samurai succeeded in becoming an easy-to-use distro with lots of great tools. Samurai also helps highlight many other great open source tools for penetration testers and information security professionals.

One of the great things about a Live CD like this is that you can boot from a CD and test the tools without having to go through the installation process, and configure them first. This gives users the opportunity to test drive test tools, before deciding whether they are valuable enough to install on major systems.

 

Thanks for reading the post

Learn about Web Testing Framework Samurai

Please share this article to your friends
« This ransomware strain is trying to disable Windows Defender and Malwarebytes
How to convert CSV files to Excel in bulk »