Web Application VA_PT First Report_Sample
Web Application VA_PT First Report_Sample
Report for
Application Name
Submitted to
<LOGO>
By:
VA/PT Team
Cyberops Infosec LLP
Attention: This document contains information from Cyberops Infosec that is confidential and privileged. The
information is intended for the private use of <Auditee Organization>. By accepting this document, you agree
to keep the contents in confidence and not copy, disclose, or distribute this without written request to and
written confirmation from Cyberops Infosec. If you are not the intended recipient, be aware that any disclosure,
copying, or distribution of the contents of this document is prohibited.
Total Pages: 14
Project Details
URL/Target URL
Project Team
1 Introduction 3
2 Executive Summary 3
3 Purpose 3
5 Standards 5
6 Tools 5
7 Checklist 5
11 Annexuture – I 11-13
Introduction
The purpose of the security assessment was to establish a baseline of information that could be obtained about
the application and assets. Specifically, we performed procedures to obtain an understanding, and assess, the
potential vulnerabilities associated with the web applications available for access via the Internet. Mentioned
below are our findings of the application security assessment.
Executive Summary
We recognize the best, most up-to-date information is without value, unless it is pertinent and accessible to
the people it is meant to serve. Client has tasked the consulting company to conduct security assessment of its
application the purpose of reporting existing security loopholes in the web application and also to provide
with recommendation to rectify the problems. This Security Assessment Report assesses the use of resources
and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external
client’s infrastructure. The scope of this security assessment effort was limited to the security controls
applicable to the client’s system environment.
The methodology used to conduct this security assessment is qualitative, and no attempt was made to
determine any annual loss expectancies, asset cost projections, or cost-effectiveness of security safeguard
recommendations. The Approach uses OWASP, SANS, Cyberops and other industry best practices that are
used industry-wide by security and audit professionals.
The overall client’s application security categorization is rated as High in accordance with industry standard.
If the safeguards recommended in this security assessment are not implemented, the result could be
modification or destruction of data, disclosure of sensitive information, or denial of service to the users who
require the information on a frequent basis.
Purpose
The purpose of this security assessment is to evaluate the adequacy of the client’s application security. This
assessment provides a structured qualitative assessment of the operational environment. It addresses
sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost-effective
safeguards to mitigate threats and associated exploitable vulnerabilities.
Standards
Tools
The following tools were used during the vulnerability assessment & penetration testing:
Summary of Findings:
Value Number of Risks
Critical 4
High 2
Medium 1
Low 1
Informative 1
Vulnerabilities
Informative
11%
Low
11%
Critical
45%
Medium
11%
High
22%
For critical vulnerabilities, is advised that you patch or upgrade as soon as possible, unless you have other mitigating
measures in place. For example, a mitigating factor could be if your installation is not accessible from the Internet.
Vulnerabilities that score in the high range usually have some of the following characteristics:
Vulnerabilities that score in the medium range usually have some of the following characteristics:
• Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics.
• Denial of service vulnerabilities that are difficult to set up.
• Exploits that require an attacker to reside on the same local network as the victim.
• Vulnerabilities where exploitation provides only very limited access.
• Vulnerabilities that require user privileges for successful exploitation.
Vulnerabilities in the low range typically have very little impact on an organization's business. Exploitation of such
vulnerabilities usually requires local or physical system access.
4: DETAIL REPORT
Severity: Critical
Description: Since Hypertext Transfer Protocol (HTTP) is stateless, special provisions must be made outside
of the protocol for the server to remember previous interactions with a user. In web-applications, a “session”
refers to a data-structure stored on the server that is associated with a specific user during a limited time-
period. A session is typically initiated by user authentication and is terminated when they logout (or otherwise
terminate the session). The session associated with the user is identified through a “session token” that is
originally generated by the server and is delivered to the browser as a cookie.
Proof of Concept:
Proof of Concept: 1
POC Image 1:
Proof of Concept: 2
POC Image 2:
Impact: The session identifier is typically stored and transferred as a cookie, the cookie must be protected to
avoid a potential attack called “session hijacking“. This is because anyone who knows the value of a session
identifier that is currently in use has the potential to “steal” that conversation from the legitimate user and
compromise their account.
Remediation:
▪ Credentials should be protected: User authentication credentials should be protected when stored using
hashing or encryption.
▪ Do not expose session ID in the URL: Session IDs should not be exposed in the URL (e.g., URL
rewriting).
▪ Session IDs should timeout: User sessions or authentication tokens should be properly invalidated
during logout.
▪ Recreate session IDs: Session IDs should be recreated after successful login.
▪ Do not send credentials over unencrypted connections: Passwords, session IDs, and other credentials
should not be sent over unencrypted connections.
Recommendation
Summary
1. Remove unwanted files and pages from production server .
2. Website server should be audited time to time.
3. Implement session management.
4. It is recommended to eliminate any control of the user on such crucial session related parameters and
use secure sessions to hold and manage such information
5. Implement strong production and development processes to prevent unapproved files from reaching
a production environment
6. Disable in-secure HTTP methods
7. Writing code with managed errors
Checklist
Information Gathering
Fingerprint Web Server Checked Secure
Review Webserver Metafiles for Information Leakage Checked Secure
Enumerate Applications on Webserver Checked Secure
Review Webpage Comments and Metadata for Information Leakage Checked Secure
Fingerprint Web Application Framework Checked Secure
Configuration and Deploy Management Testing
Test HTTP Methods Checked Secure
Test HTTP Strict Transport Security Checked Secure
Test X-Content-Type-Options Checked Secure
Test X-XSS-Protection Header Checked Secure
Test Content-Security-Policy Checked Secure
Test X-Frame-Options Checked Secure
Test RIA cross domain policy Checked Secure
Authentication Testing
Testing for Credentials Transported over an Encrypted Channel Checked Secure
Testing for default credentials Checked Secure
Testing for Weak lock out mechanism Checked Secure
Test remember password functionality Checked Secure
Testing for Browser cache weakness Checked Secure
Testing for Weak password policy Checked Secure
Testing for Weak security question/answer Checked Secure
Testing for weak password change or reset functionalities Checked Secure
Testing for Weaker authentication in alternative channel Checked Secure
concurrent login Checked Secure
Authorization Testing
Testing Directory traversal/file include Checked Secure
Hidden Directories Checked Secure
Testing for bypassing authorization schema Checked Secure
Testing for Privilege Escalation Checked Secure
Testing for Insecure Direct Object References Checked Secure
Session Management Testing
Testing for Bypassing Session Management Schema Checked Secure
Testing for Cookies attributes Checked Secure
Testing for Session Fixation Checked Secure
Testing for Exposed Session Variables (session Replay) Checked Secure
Testing for Cross Site Request Forgery Checked Secure
Testing for logout functionality Checked Secure
Test Session Timeout Checked Secure
Testing for Session puzzling Checked Secure