Skip to content

billxie22901/willx96_CyberSecurity_Week8_Assignment_Files

Repository files navigation

Project 8 - Pentesting Live Targets

Time spent: X hours spent in total

Objective: Identify vulnerabilities in three different versions of the Globitek website: blue, green, and red.

The six possible exploits are:

  • Username Enumeration
  • Insecure Direct Object Reference (IDOR)
  • SQL Injection (SQLi)
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Session Hijacking/Fixation

Each version of the site has been given two of the six vulnerabilities. (In other words, all six of the exploits should be assignable to one of the sites.)

Blue

Vulnerability #1: SQL Injection (SQLi)

  • Description: URL unsanatized. Puting %27%20OR%20SLEEP(5)=0--%27 into the Salesperson ID will execute the SQL Injection. In this case, waiting 5 seconds before moving going to the default salesperson. GIF Walkthrough:

Vulnerability #2: Session Hijacking/Fixation

  • Description: Session not secure and login info was forwarded to another site. I logged in to blue site and that also gave me access to red site. GIF Walkthrough

Green

Vulnerability #1: Username Emumeration

  • Description: If a known username is entered and login fails, the error message is bolded, whereas if the username is unknow, the error message would be unbolded. GIF Walkthrough:

Vulnerability #2: Cross-Site Scripting (XSS)

  • Description: Though no actual exploit found regarding XSS on any site, I believe the most likely candidate would be the green site. I tried to contact all three sit with the script "<script>alert(’xss exploit found by willx96');</script>" and only the green site does not show the comment. GIF Walkthrough

Red

Vulnerability #1: Insecure Direct Object Reference (IDOR)

  • Description: When viewing a sales person you found under the "Find a Salesperson" page, you can change their ID in the URL, you will get to a different salesperson. GIF Walkthrough

Vulnerability #2: Cross-Site Request Forgery (CSRF)

  • Description: Malicious HTML file can hijack valid user's session to do malicious things. In this case, changing the salesperson name and contact info. GIF Walkthrough

Notes

License

Copyright [2017] [William Xie]

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

Week 8 Assignment

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages