联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp

您当前位置:首页 >> Database作业Database作业

日期:2022-04-01 11:18

Security and Networks: Exercise 4

Deadline: 31 March, 4pm

Web Security

It’s time to take a look at the company’s website and find out what is really going on.

You can find the company’s site by going to 127.0.0.1 on the VM. This address will

not work from outside the VM. You can find a copy of the Burp proxy in the Alice

account: aliceBlack:aliceGHdj%*3. You can also get (and attack) the website by going

to 192.168.56.101 (or whatever the IP address of your VM is) on your laptop once the VM

is running. The source code for this website can be found in the /var/www/html directory.

As you might have guessed this website contains many security vulnerabilities.

If you use a PC or tablet with the x86-64 architecture (every computer or tablet except

Apple Mac with Arm architecture), you need to download a new version of the virtual

machine from canvas, which is called ICS21 V2. The previous version lacks some tokens.

Attacking the website

This website looks like a furniture store, but you suspect that there is more going on. You

need to investigate this site and look for web vulnerabilities. All your attacks must be

carried out via the website (i.e. over port 80).

1. Investigate the products: Find a SQL injection attack that makes the site display

all of the products it has in the database. One of the products that is not normally

displayed includes a token, submit this token to the token submission website.

[1 mark]

2. Get access to the hidden site: Investigate the websites cookies and find a way

to get access to the hidden content on the site using an account you have created on

the website yourself. You will find a token displayed on the main page of the hidden

site, submit this token.

[2 marks]

3. Escalating your privileges: Find the admin control panel, and from here log into

the User Management page. On this page you will find another token, submit this.

[3 marks]

1

4. Get access to the database: Find a file upload attack and use it to upload some

php that lets you view the source code of the mysql.php page. On this page you will

find the sql database password. Use this to access the database where you will find

another token. Once you know the password, you can do this from the VM command

line with mysql -h 127.0.0.1 -u <username> -p. Submit this token to the token

submission website. [4 marks]

5. Shell injection: Find a shell code injection attack on the website and use it to view

the file /webtoken. Submit this to the token website.

[4 marks]

Getting Help

The paper: “The OWASP Top1” provides an excellent description of the kinds of web

attacks you can use to complete these exercises. The best place to get direct help is the

lab session.

1https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

2


相关文章

版权所有:编程辅导网 2020 All Rights Reserved 联系方式:QQ:99515681 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。