diff options
| author | mo khan <mo@mokhan.ca> | 2016-02-17 20:09:16 -0700 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2016-02-17 20:09:16 -0700 |
| commit | ace0f876b88f9b639b3b98f3984425971237afef (patch) | |
| tree | 5ac5eea309ad15ceb809238efd1f4869446a05e1 /report | |
| parent | 3c13fd44dac49d6286c1feb89ff89deffa5909b0 (diff) | |
final touches on report.
Diffstat (limited to 'report')
| -rw-r--r-- | report/hosts.csv | 1 | ||||
| -rw-r--r-- | report/template.tex | 47 |
2 files changed, 28 insertions, 20 deletions
diff --git a/report/hosts.csv b/report/hosts.csv index 9f5d4a7..355f3db 100644 --- a/report/hosts.csv +++ b/report/hosts.csv @@ -5,6 +5,5 @@ ip address,hostname,operating system 10.2.1.4,samurai.sait230.ca,Linux 2.6.x 10.2.1.5,nessus.sait230.ca,Linux 2.6.x 10.2.1.6,tomcat-apache.sait230.ca,Linux 2.6.x -10.2.1.7,dvwa.sait230.ca,Linux 2.6.x 10.2.1.8,bwa.sait230.ca,Linux 2.6.x 10.2.1.30,bt5r3-was.sait230.ca,Linux 2.6.x diff --git a/report/template.tex b/report/template.tex index ab48125..7913a01 100644 --- a/report/template.tex +++ b/report/template.tex @@ -11,7 +11,9 @@ \usepackage{csvsimple} \usepackage{draftwatermark} -\SetWatermarkText{\textsc{Confidential}} +\SetWatermarkText{\textsc{Restricted}} + +\usetikzlibrary{graphs,quotes} \lstset{ numbers=left, @@ -127,20 +129,18 @@ recommendations to remediate the issues identified. \subsection{Technical Summary of Issues} -\begin{center} - \begin{tabular}{| l | l | | l |} - \hline - \textbf{Severity} & \textbf{Issue Title} & \textbf{Recommendation Summary} \\ \hline \hline - Medium & DVWA Cross Site Scripting & Validate all user input \\ \hline - High & DVWA SQL Injection & Validate all user input. \\ \hline - High & Root access to MySQL server. & Disable mysql root account. \\ \hline - Medium & Vulnerable Wordpress Spreadsheet Plugin. & Disable vulnerable plugin or upgrade. \\ \hline - High & Default Tomcat Installation & Change default tomcat installation. \\ \hline - High & PHPMyAdmin root Access & Secure access to phpMyAdmin. \\ \hline - High & Tikiwiki command execution flaw & Command execution flaw allows users to run arbitrary code within the target host. \\ \hline - \hline - \end{tabular} -\end{center} +\begin{tabular}{| l | l | l |} + \hline + \textbf{Severity} & \textbf{Issue Title} & \textbf{Recommendation Summary} \\ \hline \hline + Medium & DVWA Cross Site Scripting & Validate all user input \\ \hline + High & DVWA SQL Injection & Validate all user input. \\ \hline + High & Root access to MySQL server. & Disable mysql root account. \\ \hline + Medium & Vulnerable Wordpress Spreadsheet Plugin. & Disable vulnerable plugin or upgrade. \\ \hline + High & Default Tomcat Installation & Change default tomcat installation. \\ \hline + High & PHPMyAdmin root Access & Secure access to phpMyAdmin. \\ \hline + High & Tikiwiki command execution flaw & Allows arbitrary code execution. \\ \hline + \hline +\end{tabular} \newpage \section{DVWA Cross Site Scripting} @@ -185,7 +185,10 @@ crafted URL. \paragraph{Recommendation} -Validate user input. Entity encode any user input data before rendering on a page. +\begin{enumerate} + \item Validate user input. + \item Entity encode any user input data before rendering on a page. +\end{enumerate} \newpage \section{DVWA SQL Injection} @@ -197,7 +200,7 @@ Validate user input. Entity encode any user input data before rendering on a pag \item[Summary] SQL Injection vulnerability \end{description} -There is a sql injection vulnerability in a web application called DVWA\@. +There is a SQL injection vulnerability in a web application called DVWA\@. After logging in to the DVWA application. I changed the security level of the application to low and found a page called "SQL Injection". @@ -338,7 +341,7 @@ root@bt-was:~# mysqldump -uroot -h metasploitable.sait230.ca \ \end{lstlisting} \newpage -With full root access and a mysql shell I can insert rows into any table in any database. +With full root access and a MySQL shell I can insert rows into any table in any database. I can update any record and I can read all information in all tables. \begin{lstlisting}[language=SQL,basicstyle=\tiny] @@ -493,7 +496,12 @@ I then took the MD5 hash for the admin account and looked up the reversed value \end{figure} \newpage -Next I logged in to the wordpress site using the username: admin, and passowrd: admin. +Next I logged in to the wordpress site using the following credentials: + +\begin{description} + \item[username] admin + \item[password] admin +\end{description} \begin{figure}[h!] \includegraphics[width=\linewidth]{images/wp-logged-in.png} @@ -506,6 +514,7 @@ Next I logged in to the wordpress site using the username: admin, and passowrd: \begin{enumerate} \item Remove the vulnerable plugin. \item Upgrade the vulnerable plugin. + \item Enforce SSL only access to the login page. \end{enumerate} \paragraph{References} |
