Scanning a Web Application!
Last updated
Last updated
Following similar steps to the previous task, I began a New Scan named "TryHackMe (Web Application Test). This time running a Web Application Test instead of a Basic Network Scan. I configured the settings in the same way as the previous task. I made sure to scan all ports and ports with low bandwidth connection.
Again, this scan took a long time so I waited for a while as Nessus completed its scan.
From the above screenshot, we can determine the plugin ID is 10107.
The authentication page discovered by the scanner was login.php.
The file extension of the config backup was .bak.
The directory containing example documents was /external/phpids/0.6/docs/examples/.
The vulnerability this application is suscetible to that is associated with X-Frame-Options is clickjacking.