Assignment2 - Web
Assignment2 - Web
Date: 21/09/2022
Session: Day 1
Topic: Web Applications Security and OWASP TOP 10
A02:2021-Cryptographic Failures
This category refers to the failures related to cryptography.
Cryptography focuses on the processes of encryption and decryption of
data. Encryption scrambles cleartext into ciphertext, which should be
gibberish to anyone who does not have the secret key to decrypt it.
Encryption ensures that no one can read the data without knowing the
secret key. Decryption converts the ciphertext back into the original
cleartext using the secret key. Example of cryptographic failures
include:
Sending sensitive data in clear text, for example, using HTTP instead of
HTTPS. HTTP is the protocol used to access the web, while HTTPS is
the secure version of HTTP. Others can read everything you send over
HTTP, but not HTTPS.
Relying on a weak cryptographic algorithm.
A03:2021-Injection
An injection attack refers to a vulnerability in the web application
where the user can insert malicious code as part of their input. One
cause of this vulnerability is the lack of proper validation and
sanitization of the user’s input. Example of Injection vulnerabilities
include SQL Injection ,Template Injection ,Command Injection and
XSS (Cross site scripting).
A04:2021-Insecure Design
This vulnerability Exists due to lack of security implementation at the
time of development of an application
Sensitive Data Exposure vulnerabilities can occur when a web
application does not adequately protect sensitive information from
being disclosed to attackers. This can include information such as
credit card data, personal information, business secrets, health records,
session tokens, or other authentication credentials disclosed in the
Application code , JS files.
Example of Insecure design include:
Web developer during the development of application left sensitive
data in the source code, which can be confidential data, any attacker or
malicious user can make public.
A05:2021-Security Misconfiguration
Security misconfigurations are vulnerabilities when application
components are vulnerable to attacks as a result of insecure
configuration option in software subsystems or components
Examples of security Misconfiguration include:
Error in handling stack traces, which reveal some information about
the design of the software, which may be helpful to the attacker in
revealing database versions, table names, code filenames, and so on.
A06:2021-Vulnerable and Outdated Components
This Includes vulnerabilities resulting from unsupported or outdated
software. Anyone who builds or uses an application without knowing
its internal components, their versions, and whether they are updated, is
exposed to this category of vulnerabilities.
Example of this vulnerability Since web developers use open source
components for its codebase rather than proprietary code, often these
components are not sufficiently checked before use and can be
vulnerable to such kind of security issues.
Server side request forgery let’s an attacker send crafted requests from
the back-end server of a vulnerable application. Hackers usually use
SSRF attacks to target internal systems that are behind firewalls and are
not accessible from the external network. An attacker may also
leverage SSRF to access services available through the loopback
interface (127.0.0.1) of the exploited server.
hacker can retrieve the content of arbitrary files on the system, which
leads to sensitive information exposure such as passwords, source code,
confidential data.
They flood the internal servers with large amounts of traffic to take up
their bandwidth, which results in an internal DOS Attack
In this snap we can see that the web server being used is nginx
version 1.19.0 , using this version we can further gather more
information about the vulnerabilities in this particular version.
Browsing other subdomain of http://testhtml5.vulweb.com
We can see above more technologies have been discovered for other
subdomains.
Using version number to exploit.
With the Information gathered from above steps , Attacker has more
knowledge about target systems and networks on how to proceed with
their attack vector during Penetration testing phase.