CyberSecurity University Assignments
Time spent: 5 hours spent in total
Objective: Identify vulnerabilities in three different versions of the Globitek website: blue, green, and red.
The six possible exploits are:
- Username Enumeration
- Insecure Direct Object Reference (IDOR)
- SQL Injection (SQLi)
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Session Hijacking/Fixation
Each version of the site has been given two of the six vulnerabilities. (In other words, all six of the exploits should be assignable to one of the sites.)
Vulnerability #1: SQLI____________
Vulnerability #2: _Session Hijacking/Fixation
Vulnerability #1: User Enumeration_
Vulnerability #2: XSS_____
Vulnerability #1: CSRF_____
Vulnerability #2: IDOR________
The IDOR challenge took a little while to figure out as the difference between the errors with a valid username and a non-valid username was very subtle. The rest of the challenges were pretty straight forward.
Exploit 1
Wordpress version: 4.2
Time: 2 hours
Issue
If the text entered into the comment field exceeds 64kb, the input gets truncated in the MySQL database. This enables XSS capability.
-
Use commnad with over 64kb worth of chartacters attached:
-
Entered data into comments field on WordPress page
-
Command executed, in this case, a 'Hello World' pop up alert.
Exploit 2
WordPress version 4.2
Time: 1 hour
Issue
Contributers can embed a YouTube link with code in the link to execute an XSS attack.
-
Grab embeded video link from YouTube
-
Created embeded link for WordPress site with link for YouTube video and XXS code for an alert.
[embed src='https://www.youtube.com/embed/7uf7Qn1uFJs\x3csvg onload=alert(document.cookie)\x3e'][/embed]
- Place code on vulbnerable page.
Exploit 3
WordPress version 3.9
Time: 1 hour
Issue
Session does not terminate when user logs out of admin console.
-
Logged into admin console as 'admin'
-
Captured HTTP traffic through Burp, sent GET request for /wp-admin/profile.php to repeater
-
Logged out of admin console
-
Resent captured GET request, session was still active.