Ethical Hacking Workshop Report
Ethical Hacking Workshop Report
ETHICAL HACKING
Web Application Penetration Testing: Web application penetration
testing is a comprehensive security assessment methodology focused
on identifying and mitigating vulnerabilities within web-based
applications. It involves simulating real world attacks to evaluate the
security posture of web applications, aiming to discover weaknesses
that could be exploited by malicious actors. This process helps
organisations safeguard sensitive data, maintain regulatory
compliance and protect the reputation from potential security
breaches .
OWASP Top 10 Security Risks (Open Web Application Security
Project):
1.Broken Access Control: Access control is the permissions granted
that allow a user to carry out an action within an application. Some
users may only be able to access data, while others can modify or
create data Broken access control is a critical security vulnerability in
which attackers can perform any action (access, modify, delete)
outside of an application’s intended permissions.
2.Cryptographic Failures : Cryptographic failures occur when an
application does not correctly implement cryptographic protocols or
algorithms. Sensitive data is often personal in nature, and can include
personal contact details; demographic information; data about
protected classes; financial data; health data; and other types of
data.
3.Injection: As a broad attack category, injection occurs when code
that's been entrusted or even malware is input in a way that allows
attackers to alter the meaning of key commands. These injection
attacks rely on coding vulnerabilities that make it possible for
invalidated users to enter input….
4.Insecure Design:
The insecure design does not refer to a specific mistake, but rather,
an overarching way of thinking that needs to be addressed.
5.Security Misconfiguration: Misconfigurations can arise at any level,
such as application servers or network services. Often, they occur
because unnecessary features (such as ports or accounts) are
enabled. Out-of-date software is also a notable problem.
6.Vulnerable and Outdated Components: This risk increases further
as many websites continue using components with known
vulnerabilities rather than updating them.
7.Identification and Authentication Failures: Failures related to
identification and authentication can occur in a variety of situations.
In general, however, they're most likely when applications have major
flaws relating to password protection, session identifiers, or no rate
limits on login attempts.
8.Software and Data Integrity Failures: When code and
infrastructure are unable to protect against integrity violations, it
could lead to security flaws impacting everything from frameworks to
client-side machines.
9.Security Logging and Monitoring Failures: This is a crucial strategy
for mitigating attacks, as excessive login failures are indicative of
breaches. These logs must be properly backed up and stored in
separate locations to prevent unintentional losses in the event of a
natural disaster or simple hardware failure.
10.Server-Side Request Forgery: Server-side request forgeries (SSRF)
occur when flaws in web applications allow malicious parties to
access or even modify resources simply by abusing basic server
functionality.
SQL Injection: SQL injection is a technique used to extract user data
by injecting web page inputs as statements through commands.
Basically, malicious users can use these instructions to manipulate
the application’s webserver.
SQL injection is a code injection technique that can compromise your
database.
SQL injection is 1 of the most common websites in techniques.
SQL injection is the injection of malicious code into SQL statements via
operation input For this activity we use the tool of like Havij to know more
about SQL Injection by following steps:
Paste any link in Havij target
Click on analyse
You can see the status at the bottom of HAvij
Click on Tables
Click on “hack”
HTML-Injection: For this activity we use bwapp.hackhub.net to know
more about HTML Injection by following steps:
Login
Select HTML Injection-Reflected(Get)
Click on “hack”
Hashing(SHA-256):