Coder Social home page Coder Social logo

live-pentesting's Introduction

Project 8 - Pentesting Live Targets

Time spent: 15 hours spent in total

Objective: Identify vulnerabilities in three different versions of the Globitek website: blue, green, and red.

The six possible exploits are:

  • Username Enumeration
  • Insecure Direct Object Reference (IDOR)
  • SQL Injection (SQLi)
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Session Hijacking/Fixation

Each version of the site has been given two of the six vulnerabilities. (In other words, all six of the exploits should be assignable to one of the sites.)

Blue

Vulnerability #1: SQL Injection. Using the ID URL parameter for the salesperson list, you can execute the SLEEP() function and make the site stall. Walkthrough: sqli

Vulnerability #2: Session Hijacking/Fixation. Session IDs aren't regenerated when logging in. Walkthrough: session

Green

Vulnerability #1: Username Enumeration. The Green site uses a CSS tag of "Failed" instead of "Failure," causing the login failure message to not be bold if the username doesn't exist and bold if it does. Walkthrough: enum

Vulnerability #2: Stored Cross-Site Scripting (XSS). Both the name and feedback fields aren't sanitized, allowing attackers to embed scripts into the fields that will trigger when the admin tries to view them. Walkthrough: xss

Red

Vulnerability #1: IDOR. The salesperson area allows users to access page IDs they aren't supposed to, such as "Testy McTesterson" and "Lazy Lazyman," which are not meant to be public. Walkthrough: idor

Vulnerability #2: CSRF. The edit pages don't check for CSRF tokens. Walkthrough: csrf

Notes

Describe any challenges encountered while doing the work

I could not find a way of getting the admin credentials, since the SQLi vulnerability in the blue site prevents me from dumping the contents of the user table via a "Database Query Failed" error message. Thus, I couldn't find three of the vulnerabilities until they were provided.

live-pentesting's People

Contributors

ykenichi avatar

Watchers

James Cloos avatar  avatar

live-pentesting's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.