Fortifying Your Website: Essential Website Security Measures

jadavvineet73 104 views 11 slides Jun 22, 2024
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

In today's digital age, website security is paramount. This presentation dives into SQL injection in depth for more visit: https://bostoninstituteofanalytics.org/cyber-security-and-ethical-hacking/


Slide Content

SQL INJECTION

1 Executive Summary This report outlines a critical security vulnerability discovered in the sngcaskannur education site specifically related to access to admin panel. The vulnerability allows for login into admin panel authentication, potentially exposing sensitive user data and compromising the integrity of the login process. Immediate action is recommended to mitigate this risk.   2 Vulnerability Details Affected System: https://www.sngcaskannur.org Vulnerability Type: SQL INJECTION Impact: Unauthorized access to user accounts, potential data breach, Severity: Critical During testing, it was observed that the admin login verification process in the online education site is susceptible to SQL injecting. the system prompts the user to enter admin panel. However, it was found that by manipulating certain parameters within the request, it is possible to proceed with the admin login process. This flaw undermines the security measures intended to protect user accounts and data, leaving them vulnerable to exploitation.

Steps to Reproduce: 1 . Open a https://www.sngcaskannur.org

2.Open login page

3.Enter login credentials username= ' or '1’=‘1 & password= ' or '1'='1 4.enter shown code and login

5.Now Ur in admin panel

ACCESS THE ADMIN PANEL

Impact • Unauthorized access to user accounts. • Potential exposure of sensitive personal information • Loss of user trust and reputation damage to www.sngcaskannur.org

Recommendations 1.Logging and Monitoring : Enable logging of admin panel access and actions taken. monitoring to detect suspicious activities or unauthorized access attempts. 2.Strong Password Policies : Enforce strong password policies such as minimum length, complexity requirements, and regular password changes. 3.Limit Access : Restrict access to the admin panel based on roles and responsibilities. Use the principle of least privilege to grant minimal permissions necessary for each role.

POC https://drive.google.com/file/d/1wsTyII2-Sxef5xQPW-RAPrnaTZq3RE8r/view?usp=drive_link

Thank You!