Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications You must be signed in to change notification settings

Week 15 Homework: Web Vulnerabilities and Hardening Homework

zwang21/Week-15-Homework

Folders and files, repository files navigation, web application 1: your wish is my command injection.

Access Vagrant and open a browser.

Launch Vagrant from GitBash and run the following command:

cd ./Documents/web-vulns && docker-compose up

Leave this page open and continue to the next step.

Open Chrome, navigate to the following web page:

http://192.168.13.25

Log in with the following credentials:

  • User name: admin
  • Password: password

Select the Command Injection option from the left menus.

Using the dot-dot-slash ../ method five times to design two payloads that will display the contents of the following files:

/etc/passwd

cat ../../../../../etc/passwd

Recommended mitigation strategies:

  • Server-side validation that does not allow selection of unintended files.​
  • Segregation of confidential files from the web server and accessible directories.
  • Permissions to restrict web server account accessibility.

Web Application 2: A Brute Force to Be Reckoned With

Run this command sudo burpsuite in Vagrant command line.

assignment 15.test attempt 1 of 1

In Burpsuite, I got following intercept data:

Proxy Intercept results

  • Send above Proxy intercept results to Intruder. Click Intruder tab;
  • Verify Target ;

Intruder Target

  • Setup Positions , select attack type Cluster bomb ;
  • Configure and add login and password as positions.

Intruder Positions

  • Click Payloads tab, choose Payload type as Simple list ;
  • Add login user ID from List of Administrators file into Payload set 1;
  • Add password from Breached list of Passwords file into Payload set 2;

Intruder Payloads

  • Click Start attack

After analysis of intruder attack results, the login username/password combination of " tonystark " and " I am Iron Man " did result in a successful login. The page displays Successful login! You really are Iron Man :) .

Intruder Results

  • Mitigations can include requiring complex usernames and passwords, using multi-factored authentication, and enabling a lockout after a certain amount of failed login attempts.

Web Application 3: Where's the BeEF?

Step 1, Prepare Replicants website

Inside Vagrant, go to this folder, run command: ~/Documents/web-vulns$ docker-compose up

Go to this website: http://192.168.13.25/vulnerabilities/xss_s/

Reset db and login again. Username: admin Password: password

Step 2, Setup BeEF

On Vagrant, open a command line and run the following command: sudo beef

When prompted for a password, enter cybersecurity .

To access the BeEF GUI, right-click the first URL UI_URL: http://127.0.0.1:3000/ui/panel and select Open Link.

When the BeEF webpage opens, login with the following credentials:

Username: beef Password: feeb

Step 3, Find BeEF hook and write payload

Step 4, Inject this payload

assignment 15.test attempt 1 of 1

Solution: Right-clicking on web page and selecting "Inspecting the Element". Change as maxlength="100" , or just delete this code limit.

assignment 15.test attempt 1 of 1

Step 5, A couple BeEF exploits

Social Engineering >> Pretty Theft

Pretty Theft - Facebook

Social Engineering >> Fake Notification Bar

Fake Notification Bar

Host >> Get Geolocation (Third Party)

Get Geolocation (Third Party)

Recommended mitigation strategies

  • Input validation is a common method used to mitigate cross-site scripting.

IMAGES

  1. ASSIGNMENTS COURSES Assignment

    assignment 15.test attempt 1 of 1

  2. Question 1 of 15

    assignment 15.test attempt 1 of 1

  3. Solved SECTION-A (15x1-15 MARKS) Answer All Questions. Each

    assignment 15.test attempt 1 of 1

  4. Solved Question 14 of 15 (1 point) Attempt 1 of 1 View

    assignment 15.test attempt 1 of 1

  5. Solved Assignment (15 marks) Answer all the following

    assignment 15.test attempt 1 of 1

  6. Gr 8 Term 1 Assignment/Test • Teacha!

    assignment 15.test attempt 1 of 1