Lab 09: OWASP A09 — Security Logging and Monitoring Failures
Objective
Background
Architecture
┌─────────────────────┐ Docker Network: lab-a09 ┌─────────────────────┐
│ KALI ATTACKER │ ─────── HTTP attacks ─────────────▶ │ VICTIM SERVER │
│ innozverse-kali │ │ innozverse-cybersec│
│ curl, python3 │ ◀────── responses ─────────────────── │ Flask :5000 │
└─────────────────────┘ │ (no logging, │
│ log injection) │
└─────────────────────┘Time
Tools
Lab Instructions
Step 1: Environment Setup
Step 2: Launch Kali
Step 3: Brute-Force Attack — Goes Completely Unlogged
Step 4: Admin Access and Destructive Actions — Not Logged
Step 5: Log Injection Attack
Step 6: Tamper-Evident Audit Log (Secure Pattern)
Step 7: Log Coverage Audit
Step 8: Cleanup
Remediation
Issue
Root Cause
Fix
Summary
Test
Finding
Impact
Further Reading
PreviousLab 08: OWASP A08 — Software and Data Integrity FailuresNextLab 10: OWASP A10 — Server-Side Request Forgery (SSRF)
Last updated
