Skip to content

This project was a part of our Web Technology, Security and Honeypot course. Where we were tasked to secure a server, with a running apache service for other students to pen-test on.

Notifications You must be signed in to change notification settings

subcidr/Project-Honeypot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

🍯The Honeybee Project🍯

Overview

This project belongs to Web Security Class. This document contains all information about the project for installing, managing and attacking our Honeypot.

Project Assignement can be found here: "HoneypotProject.md"

Getting Started

Website Notes

  • You can access the website whilst connected to the FortiClient-VPN at; "rgp06.hp.ti.howest.be"
  • Running on HTTPS only.
  • User - password for an administrator account (user : admin |password: adminiscool).

Server Notes

  • Server is running on; ex. Debian GNU/Linux 11.
  • Recommend connecting with "Windows Terminal".
  • Also running on HTTPS only.

Connect to Server

SSH into our server with the following details;

  • hostname; rgp06.hp.ti.howest.be
  • username; killerb
  • password; sexydorian

Challanges

  • Challenge one! Identify the vulnerable input (SQL Injection)
    Try to inject SQL Code through the website to display the secret table stored in our Database.
First you have to find the broken input which is located on the indexStat.php page. 

By testing the input, we can see that he is vulnerable. 
Then, we can retreive table information and stuff with : 
    test' UNION SELECT table_name, "u", "u" from information_schema.tables-- -
When the secret table is identified and that we know the structure, we can display the secret.
    test' UNION SELECT secret, "u", "u" from really_secret_table-- -
  • Challange Two! - Insert yourself in the team database
    Having solved the first challenge, use SQL Injection to insert your user into the team table in Databse.
Same input on the indexStat.php but we have to do an insert into the collector_team table. 

    '; INSERT INTO collector_team (id_team, name, title) VALUES (3, "Dog","Test");-- 
  • Challange Three! - Find XSS vulerable query
    A input is XSS vulnerable, find it !
The searchbar on the index page is vulnerable to XSS. Try to search: 
    <script>alert('xss')</script>
  • Challange Four! - Break the website with a JS Alert
    If you found the XSS vulnerable input, enjoy with it !
Now that we found it, we can try to retreive information with that exploit. Enjoy ! 

Kibana

Ansible

The following ansible-playbook will;

  • Install and configure:
    • GIT | APACHE | PHP | MYSQL | PYTHON3 | PIP | PYOPENSSL | CRUPTOGRAPHY.
  • Clones and configures Website
  • Generates and applies SSL keys
  • Enables and disables modifications
  • Triggers angry bees.

Clone the project

git clone [email protected]:TI/2021-2022/s3/web-security/projects/project-06/honeybee.git

Run the playbook

sudo ansible-plabook -i hosts HoneyTastesGood.yml

Ansible File Hierarchy

Ansible

├── files
│   ├── honeybeeHTTP.conf.j2
│   └── honeybeeHTTPS.conf.j2
├── tasks
│   ├── config.conf
│   └── install.conf
├── vars
│   └── default.yml

└── HoneyTastesGood.yml

3 directories,  6 files   

Authors

Contributors names ~

ex. [email protected]
ex. [email protected]

About

This project was a part of our Web Technology, Security and Honeypot course. Where we were tasked to secure a server, with a running apache service for other students to pen-test on.

Resources

Stars

Watchers

Forks

Languages