PS Cyber Security
PS Cyber Security
CYBERSECURITY
Any web service open to the internet is a potential target of malicious attacks with motives
ranging from service disruption to data theft. It is an essential requirement of each company to
ensure that their web assets are adequately protected from such malicious motives.
The aim is to undertake a complete security audit of the given websites deployed on the web.
Use tools as necessary to check for various vulnerabilities and software exploits that may be
present. Log the full process of the audit, including the tools and approaches used. Document all
findings in the format provided and submit it for project completion. Create a comprehensive
report about all of these actions taken, as also suggested improvements and patches to make the
system secure against future attacks.
TARGETS –
The systems to be audited are linked here:
https://ccgit.in
https://www.cloudcounselage.com
http://hkrb.hackxor.net
http://phonecorp.hackxor.net
http://hmrc.hackxor.net/login?redir=/
http://dreaded.hackxor.net
https://xss-game.appspot.com/level1/frame (no brute forcing)
http://temporal.hax.w3challs.com/administration.php (no brute forcing)
http://webcompany.hax.w3challs.com (no brute forcing)
http://w3news.hax.w3challs.com (no brute forcing)
CONSTRAINTS –
• All testing shall be done on the hosted instance without locally downloading.
• You are only authorized to work on the asset provided to you, linked above. Acting on any
other asset, service, or resource of the company is forbidden, while such actions on elements
not owned by the company is at your own risk.
• Do not brute force sites that are masked such. That includes DoS attacks.
• The system is not to be worked upon, after the Findings Document is submitted.