Securing Solve Labs: Addressing Key Vulnerabilities through Practical Labs

jadavvineet73 196 views 46 slides Jul 26, 2024
Slide 1
Slide 1 of 46
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46

About This Presentation

Explore our comprehensive approach to identifying and mitigating common web application vulnerabilities in Solve Labs. This presentation details four critical security issues: Login Bypass, Admin Credentials Access via SQL Injection, Cross-Site Request Forgery (CSRF), and Cross-Site Scripting (XSS)....


Slide Content

Solve Labs that are created for the following vulnerabilities: 1. Login Bypass 2. Admin Credentials Access (SQLi) 3. CSRF 4. XSS CNP-MAR2024-CSEH-1 BY-JATIN SAINI

RESEARCH Name- PortSwigger : Web Application Security, Testing, & Scanning URL - https://portswigger.net/ CATEGORY- Web Application Security, Testing, & Scanning TECHNOLOGY USED – Analytics- Piwik PRO core|Web server- Kestrel| Security- HSTS|Javascript Libraries- LazySizes|Web Freamworks -Microsoft ASP.NET| Performance- LazySizes | Miscellaneous- open Graph.

IMPACT ANALYSIS LOGIN BYPASS 1. Unauthorized access Impact: Attackers can access sensitive systems and data without adequate authentication. consequences: Disclose confidential information (e.g., personal information, financial records). potential data breaches and loss of intellectual property. 2. Data Integrity and Manipulation Impact : Unauthorized users may alter or delete critical data. Consequences: Corruption of databases and loss of data integrity. Inaccurate information leading to poor decision-making. Potential legal implications if regulatory compliance is breached. 3. Reputational Damage Impact : The organization’s reputation may suffer. Consequences : Loss of customer trust and loyalty. Negative media coverage. Long-term damage to brand reputation and market position.

LOGIN BYPASS MITIGATION Regular Security Audits : Conduct frequent security audits to identify and remediate vulnerabilities. Multi-Factor Authentication (MFA) : Implement MFA to add an extra layer of security. User Access Management : Enforce strict access controls and regularly review user permissions. Incident Response Plan : Develop and maintain an incident response plan to quickly address and mitigate security breaches. Security Awareness Training : Educate employees on security best practices and phishing prevention. Regular Software Updates : Ensure all systems and applications are regularly updated to patch known vulnerabilities.

IMPACT ANALYSIS-ADMIN CREDENTIALS ACCESS SQLi 3 1. Unauthorized employment Impact: Attackers can gain business privileges on the affected system or application. consequences: Full control: Attackers can manipulate the entire database, including creating, modifying, or deleting data and user accounts. Access to sensitive information: Performance credentials often provide access to highly sensitive and valuable information within an organization. Potential for further exploits: Admin access enables attackers to escalate their attacks by causing extensive damage to other systems. 2. Data Breach and Confidentiality Agreement Impact: Disclosure of sensitive private information. consequences: Disclosure of Personal Financial Information: Disclosure of personal information, financial records, trade secrets, and other confidential information. Non-compliance: Breach of GDPR, HIPAA, and other data protection laws, with legal ramifications. Identity theft and fraud: Stolen information can be used for identity theft, financial fraud, and other malicious activities. 3. Provision in existence of system integrity Impact: Abuse or disruption of system functionality. consequences: Data Integrity Issues: Attackers can alter or delete sensitive data, resulting in data corruption and loss of confidence in data integrity. Service Interruption: Critical systems and services may be disrupted or taken offline, affecting business operations and customer services. Malware exploitation: Attackers can professionally exploit malware or ransomware, causing severe system security compromises and significant performance disruption.

MITIGATION-ADMIN CREDENTIALS ACCESS SQLi 3 Input Validation and Sanitization : Ensure all user inputs are properly validated and sanitized to prevent SQL injection. Parameterized Queries : Use parameterized queries or prepared statements to interact with the database, avoiding direct SQL command execution with user input . Least Privilege Principle : Limit the database permissions and access rights for application accounts, ensuring they only have the minimum necessary privileges. Regular Security Audits and Penetration Testing : Conduct regular security audits and penetration testing to identify and remediate vulnerabilities. Web Application Firewalls (WAFs) : Implement WAFs to detect and block SQL injection attacks in real-time. Security Patches and Updates : Regularly update and patch all systems, applications, and databases to address known vulnerabilities. Security Awareness Training : Educate developers and IT staff on secure coding practices and the importance of protecting against SQL injection attacks.

IMPACT ANALYSIS- CSRF 1. Unauthorized Actions Impact : Attackers can execute actions on behalf of authenticated users without their consent. Consequences : Unintended transactions (e.g., fund transfers, purchase orders). Changes to user settings (e.g., email address, password). 2. Data Integrity and Confidentiality Impact : Sensitive data may be exposed or altered. Consequences : Modification or deletion of important records. Exposure of confidential information (e.g., personal details, financial data). 3. Financial Loss Impact : Direct and indirect financial losses for both users and organizations. Consequences : Unauthorized financial transactions leading to monetary loss. Costs associated with incident response and remediation. Potential legal liabilities and compensation claims. 6. Compromise of User Accounts Impact : Attackers can gain control over user accounts. Consequences : Hijacking of user accounts for malicious activities. Use of compromised accounts to spread further attacks (e.g., spam, phishing).

MITIGATIONS- CSRF Anti-CSRF Tokens : Implement anti-CSRF tokens in forms and state-changing requests to ensure the validity of requests. SameSite Cookie Attribute : Use the SameSite attribute in cookies to restrict cross-site requests. User Interaction Verification : Require additional verification (e.g., re-entering the password, CAPTCHA) for sensitive actions. Referer Header Validation : Check the Referer header to ensure that the request is coming from the expected origin. Security Awareness Training : Educate users about the risks of CSRF and safe browsing practices. Regular Security Audits : Conduct regular security audits and penetration testing to identify and address vulnerabilities. Framework Security Features : Use built-in security features provided by web frameworks to defend against CSRF attacks.

IMAPCT ANALYSIS- XSS (CROSS SITE SCRIPTING) 1. Data Theft Impact : Attackers can steal sensitive information such as cookies, session tokens, and other critical data from the victim's browser. Consequences : Unauthorized access to user accounts. Exposure of personal and financial information. Identity theft and fraud. 2. Session Hijacking Impact : Attackers can hijack user sessions to gain unauthorized access to the application. Consequences : Attacker impersonates the victim, performing actions on their behalf. Potential for further exploitation within the application. 3. Defacement Impact : Malicious scripts can alter the content displayed to users. Consequences : Defacement of web pages leading to a damaged reputation. Misleading information being displayed to users

MITIGATIONS- XSS Input Validation : Ensure all input is validated and sanitized to prevent injection of malicious scripts. Output Encoding : Encode output to ensure that any data that is rendered in the browser is treated as data, not executable code. Content Security Policy (CSP) : Implement CSP to restrict the execution of unauthorized scripts. Security Testing : Regularly conduct security assessments, including penetration testing and code reviews. User Education : Educate users on the risks of XSS and safe browsing practices. Use Security Libraries and Frameworks : Leverage security features provided by modern web frameworks and libraries to mitigate XSS risks.

SCREEN SHOT LOGIN BYPASS

SCREEN SHOT ADMIN CREDENTIALS ACCESS SQLi

SCREEN SHOT CSRF

XSS CROSS SITE SCRIPTING SCREEN SHOT (STORED )

DOM XSS SCREEN SHOT

TOOLS USED IN PROJECT TOOLS – BURPSUITE , WAPPALYZER , PLATFORM USED- PORTSWIGGER PASSIVE RECONNISSANCE – WHO.IS , EDGUR CODE USED - ">< svg onload=alert(1)>for DOM XSS DOCUMENT.WRITE <>< img src =1 onerror =alert(1)> FOR STORED DOM XSS

Thank You!