Web Application Penetration Testing - Final Project
Web Application Penetration Testing - Final Project
HackerU
Penetration Test Report for
TechNation’s Technology Blog
v.1.0
Jakub Kozub
[email protected]
OSID: Ubuntu
No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved to its copyright
owner, including photocopying and all other copying, any transfer or transmission using any network or other means of communication,
any broadcast for distant learning, in any form or by any means such as any information storage, transmission or retrieval system,
without prior written permission from HackerU.
1 | Page
`
Table of Contents
1. Introduction
1.1 Overview
1.2 Scope
1.3 Requirements
1.4 Summary
2. Key Findings
2.1 Overview
2.2 Risk Classification
2.3 Findings
3. Detailed Findings
3.1 Vulnerability One: Exposure of Personal Information
3.2 Vulnerability Two: Cryptographic Failure
3.3 Vulnerability Three: Unprotected Endpoint Access
3.4 Vulnerability Four: Weak Authentication Mechanism
3.5 Vulnerability Five: SQL Injection
3.6 Vulnerability Six: Remote File Inclusion
3.7 Vulnerability Seven: Improper Access Control
3.8 Vulnerability Eight: Cross-Site Scripting (XSS)
3.9 Vulnerability Nine: Insecure Direct Object Reference (IDOR)
2 | Page
`
1. Introduction
1.1 Overview
1.2 Scope
The test was specifically carried out on a beta version of the website, se-
curely hosted within a Docker container. It's essential to note that the client
explicitly prohibited testing on the live site. Therefore, Burp Suite was se-
lected as the primary tool for conducting the tests.
3 | Page
`
1.4 Summary
4 | Page
`
2. Key Findings
2.1 Overview
This section provides a high-level summary of the key findings from the pen-
etration test conducted on TechNation's Technology blog. It identifies vulner-
abilities discovered, ranging from information exposure to critical security
flaws, and introduces the risk classification system used to assess their se-
verity.
5 | Page
`
6 | Page
`
2.3 Findings
The findings section presents a detailed analysis of the vulnerabilities dis-
covered during the penetration test on TechNation's Technology blog.
These vulnerabilities encompass various aspects of the web application's
security, ranging from inadequate authentication mechanisms to vulnerabil-
ities in code implementation. Each vulnerability is assessed based on its
severity, probability of occurrence, fix effort required, and overall risk score.
7 | Page
`
8 | Page
`
3. Detailed Findings
The Detailed Findings section offers an in-depth examination of the vulner-
abilities identified during the penetration test conducted on TechNation's
Technology blog. Each vulnerability is meticulously analyzed, providing
comprehensive descriptions, steps taken to uncover them, observations
made, recommendations for mitigation, potential impacts on security, and
supporting evidence. This section serves as a detailed roadmap for under-
standing the specific security weaknesses within the web application, ena-
bling stakeholders to prioritize and implement necessary remediation
measures effectively.
9 | Page
`
Description:
Steps Taken:
10 | Page
`
Exploitation:
• Leveraged the exposed email addresses and full names for targeted
phishing attacks.
Observations:
Recommendations:
11 | Page
`
Impact:
12 | Page
`
Evidence:
13 | Page
`
Description:
Steps Taken:
2. Observed that the website solely utilizes HTTP for data transmission,
lacking the additional security provided by HTTPS encryption.
14 | Page
`
Exploitation:
Observations:
15 | Page
`
Recommendations:
Impact:
16 | Page
`
Evidence:
17 | Page
`
Description:
Steps Taken:
18 | Page
`
Exploitation:
Observations:
19 | Page
`
Recommendations:
Impact:
20 | Page
`
Evidence:
21 | Page
`
Description:
Steps Taken:
22 | Page
`
Exploitation:
Observations:
23 | Page
`
Recommendations:
Impact:
24 | Page
`
Evidence:
25 | Page
`
26 | Page
`
Description:
Steps Taken:
Exploitation:
• Used the modified password to easily log into the admin panel, in-
cluding the account for the administrator ([email protected]).
27 | Page
`
Observations:
Recommendations:
Impact:
Evidence:
' or 1=1-- -
29 | Page
`
Description:
Steps Taken:
2. Identified the ability to include remote files via insecure file inclusion
mechanisms.
30 | Page
`
Exploitation:
Observations:
Recommendations:
• Implement secure file upload mechanisms with strict file type valida-
tion.
31 | Page
`
Impact:
32 | Page
`
Evidence:
33 | Page
`
Description:
Steps Taken:
34 | Page
`
Exploitation:
Observations:
Recommendations:
• Regularly monitor and audit user access logs for suspicious activity.
35 | Page
`
Impact:
Evidence:
36 | Page
`
Description:
Steps Taken:
37 | Page
`
Exploitation:
• Intercepted the network traffic request using Burp Suite and modified
the request line entitled "score" by adding the command <body on-
load=alert('Hacked!')>.
Observations:
• Vulnerable to XSS attacks, allowing for script execution within the ap-
plication.
38 | Page
`
Recommendations:
Impact:
39 | Page
`
Evidence:
40 | Page
`
41 | Page
`
Description:
42 | Page
`
Steps Taken:
1. Intercepted Traffic: The traffic from the /Deals.php endpoint was inter-
cepted using Burp Suite during the penetration test.
Exploitation:
43 | Page
`
Recommendations:
Impact:
44 | Page
`
Evidence:
45 | Page
`
46 | Page
`
4.1 Introduction:
In this section, we provide an overview of the key findings from the penetra-
tion test conducted on TechNation's Technology blog. Additionally, we out-
line recommendations for improving the security posture of the web appli-
cation to mitigate the identified vulnerabilities effectively.
47 | Page
`
measures to safeguard user data and maintain the trust and integrity of the
platform.
48 | Page
`
49 | Page
`
50 | Page