This exercise is a set of the most common web vulnerabilities and interactions between Network Security and Web Server. Using information you will able to attack Web server, you will be able to gain access to the Web Server and deploy a WebShell to gain commands execution. Post attack you will be able to perform WAF mitigation on firewall to prevent the attack at perimeter level
All access to lab systems takes place through a browser type interface. In some labs the deployed cloud will include several instances. Access to secondary instances will take place through the browser interface using SSH from one virtual instance to another.
The suggested and tested browser to use is Chrome, although others may work. The course material includes a URL for lab access. You will use your eCyLabs login and password to gain access. After successfully logging in you will be presented a new page and a virtual machine instance will be created.