Breakout Report
Breakout Report
1.Document information
Report owner Abhiram SS
Pen-tester Abhiram SS
Date last updated 2022-08-22
1.1 Graph
Findings
Critical High Medium Low
10 10
80
.
4 Findings and recommendations
Critical risk vulnerabilities
The issues marked as "critical severity" can allow attackers to execute code on the web
application or application server or access sensitive data. A critical A vulnerability is one where
an exploit or proof-of-concept code is publicly available or being actively exploited.
During the test, we identified the password as disclosure in the HTML page, which is critical
damage to the server. The ciphers are displayed in the HTML page and can be easily decrypted
by standard tools for ciphers. As a result, avoid putting ciphers on your website, which will cause
the server to crash.
Affected Host
http://198.168.19.130
Proof
The ciphers at the end of the page.
After decrypting the ciphers, we got the password for the login page.
Remediation
To prevent this, we need to avoid uploading the decrypted texts to the web server.
That is the best way to secure our webpage, so avoid uploading the ciphers so it
will be more secure from the hackers.
References
https://portswigger.net/kb/issues/006000b0_source-code-disclosure
https://www.beyondsecurity.com/resources/vulnerabilities/source-
disclosure/
https://docs.imperva.com/bundle/on-premises-knowledgebase-reference-
guide/page/source_code_disclosure.htm
Command injection
Affected Hosts:
https://192.168.19.130:20000/shell/?xnavigation=
Proof:
Execution Command Injection
In the above image, we can see that the hacker has written bad script in the command injection
part; this is the place where Hacker will get shell, which means he will get full control over the
web server. So please remove this command shell part from the web page.
Gaining the shell from above Bad Script
Remediation
The most effective way to prevent command injection is to remove the Command shell from the
login page so no hacker can execute the bad command in the webpage. That is the part where
hackers can easily get into the server, and they will have full control over the server .
References
https://portswigger.net/web-security/os-command-injection
https://brightsec.com/blog/os-command-injection/\
https://resources.infosecinstitute.com/topic/how-to-mitigate-command-
injection-vulnerabilities/
After enumeration on the machine, we see that there is old_pass.bak file located in /var/backups
but we don’t have the required permissions to view the file contents
Command Used: cd /var/backups/
Let’s get back to tar file so we try to do anything with it.so we have get more information about
the capabilities which exists here. So we will try see the capabilities in the webserver
Then we can see we got access to root so we can change or modify the webpage
Remediation
It is advised to remove the tar file so that hacker cannot get the root access through binary files .
References
https://man7.org/linux/man-pages/man7/capabilities.7.html
https://nxnjz.net/2018/08/an-interesting-privilege-escalation-vector-getcap/
Affected Hosts:
https://192.168.19.130:20000
Proof:
In the Screenshot below you can see the User Cyber
Command Used: enum4linux -a <ip>
Remediation
It is recommended to upgrade the version of samba so there will no disclosure .There are so
many alternatives for samba server that are SuitDash,lgloo so this is more secure than samba.
References
https://www.g2.com/products/samba-server-ready-to-go/competitors/alternatives