A Project Report On: Website Penetration Testing: Electronics and Communication Engineering
A Project Report On: Website Penetration Testing: Electronics and Communication Engineering
A Project Report On: Website Penetration Testing: Electronics and Communication Engineering
In
Submitted by
(Autonomous)
2020-2021
Website Penetration Testing
CERTIFICATE
This is to certify that the course project report entitled “Website Penetration Testing” is a
bonafide work done by, KALWALA SIDDHARTHA REDDY (18H51A04K0) of III B.
Tech, V semester in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology, submitted to Department of Electronics and Communication
Engineering, CMR College of Engineering & Technology, Hyderabad during the Academic
Year 2020-21.
ACKNOWLEDGEMENT
We are highly indebted and grateful to our guide Mr. Abdul Subhani Shaik,
Associate Professor, Department of ECE, CMRCET for his excellent guidance and
constant encouragement throughout for the successful completion of the Project.
We are obliged and grateful to thank, Mr. E.N.V. PURNA CHANDRA RAO
HOD, Department of ECE, CMRCET, for his cooperation in all respects.
Finally, we would like to thank all teaching & non- teaching staff members of
the department, for their cooperation and support throughout the duration of our
course.
Ultimately, we own all our success to our beloved parents, whose vision, love
and inspiration has made us to reach out for these glories.
SIGNATURE
DECLARATION
ABSTRACT
Index:
1.1 Introduction 6
1.2 Objective 7
1.3 Future Scope 7
1.4 Requirements 7
2 Implementation
2.1 Introduction 8
2.2 Methodology 9-18
2.3 Flow Chart 19
3 Results and Conclusion 19
3.1 Result 19
3.2 Conclusion 19
4 Reference 20
Appendix 20
CHAPTER 1:
INTRODUCTION
White hat hackers are also known as ethical hackers. They are employed by some
private organizations or under the government as security specialists. The main job
of these white hat hackers is to test the applications, search for the vulnerabilities,
report to the organization and update the security of the application. They always
have permission from the system’s owner, making their actions completely legal.
Black Hat Hackers are completely opposite of white hat hackers. They frequently
develop a malware which will infiltrate the computer networks. They follow the
same methods of white hat hackers but they don’t have permission of the system
owner hence, their actions are completely illegal. Black hat hackers can either steal
manipulate or can destroy the data.
As the name suggests, these individuals utilize aspects from black and white hat
hackers, but will usually seek out vulnerabilities in a system without an owner’s
permission or knowledge. While they’ll report any issues, they encounter to the
owner, they’ll also request some sort of compensation or incentive. If the owner
refuses to give them incentives then these hackers might exploit the newfound
flaws.
OBJECTIVE
1. Information Gathering.
2. Identifying Vulnerabilities.
3. Exploiting those vulnerabilities.
4. Updating the Security.
5. Improving the cyber-defense capability.
FUTURE SCOPE
We also know that the number of cyberattacks is increasing drastically day by day
so, there will be lot of scope for the ethical hackers in future. Employment of
cybersecurity analysis projected to grow 32% from 2018-2028. In USA the
average advertised salary for a cybersecurity job is now $93,560, which is 16%
higher than the average salary of all IT jobs.
REQUIREMENTS
CHAPTER 2:
IMPLEMENTATION:
INTODUCTION:
Penetration testing is a type of security testing that is used to test the insecurity of
an application. It is conducted to find the security risk which might be present in
the system.
If a system is not secured, then any attacker can disrupt or take authorized access
to that system. Security risk is normally an accidental error that occurs while
developing and implementing the software. For example, configuration errors,
design errors, and software bugs, etc.
Identifying Vulnerabilities
Exploiting
This is the final stage of a penetration test. The information that we have
gathered, the vulnerabilities that we identified, will help us in this stage.
Exploitation is the process of taking advantage of the vulnerabilities to do some
serious damage or to find out the extent to which a vulnerability can be misused.
Exploitation might not be that much easy. Sometimes, multiple vulnerabilities need
to be chained together to perform an exploitation. Perfect execution of these
attacks might require some good amount of experience.
METHODOLOGY:
URL: https://csclub-cmrcet.github.io/startupCTF/index.html
When we click on the above URL you can see the website and as you observe
keenly at the about us page you will be able to find the owner of this website. The
owner of this website is Fred Krueger.
Fig.No.1: Website
If we observe his twitter profile clearly, we can find a lot of information about the
owner. The owner lives in a place called Silver Spring, Maryland. The owner was
born on 1990. This was the basic information about the owner.
http://www.cornerstoneairlines.co/
This was the website mentioned in his twitter profile. But the website isn’t
working. The name suggests that he used to run an airlines company which was
found in the year 2018 in U.S. This website worked for a year and 8 months.
When we observe his Instagram handle, we found a flight ticket he was travelling
from Baltimore to San-Francisco and it’s a first-class ticket.
We have gathered the owner’s information successfully with the help of Open-
Source Intelligence (OSINT) tools.
There were 6 flags hidden in this website. Let’s find out those hidden flags.
When you observe the source code you can find the first flag of this website. The
flag was:
Fig.No.5: Flag-1
I thought the second code will be in JavaScript files. So, to find the javascript files
we have to go to the inspect element tab. Right click anywhere on the website and
click on inspect element option. In the right side you will find a tab. Go to the
networks tab and it asks us to refresh the page. Do as it said and you will find
many files of the website. In the top, click on JS then, you will find all the
JavaScript files. I’ve checked the files one by one thoroughly and I was successful
in finding the second flag. It was hidden in plugins.js file.
Flag 2: FLAG_CMRCET_2{3ASY_P3SY_J4V4SCR1PT}
Fig.No.7: Flag-2
There is a login option at the top of the website. I thought if I login to the website I
can find the third flag. We don’t know the credentials of the login page. There is a
way to bypass this login page. We need to go inspect element tab then go to
networks tab and find the login.html file. The login page looks like this.
After entering the login.html file in the inspect element tab. You will find some
details about the file such as request URL, request method, remote address etc.
I thought if I edit this then I can login to this website as an administrator. I’ve
added an extra cookie which to this file and click on send button.
Cookie:password=;username=admin;admin=True
Now again visit the login page and type the default credentials say
username=admin and password=admin. Once you login to the website it pops up
the third flag.
Flag3: FLAG_CMRCET_3{W3AK_P4SSW0RDS_AR3_D4NG3R }
I found flags in source code and JavaScript file. So, I thought I can find a flag in a
CSS file. I again visited the inspect element and this time I checked all the CSS
files thoroughly. I was successful in finding the fourth flag.
Flag4: FLAG_CMRCET_4{M4ST3R_1NSP3CT_3L3M3NT }
Fig.No.11: Flag-4
For the fifth flag I have sent a phishing mail to the mail id which was provided in
the about us page.
This was the mail which I sent to the mail id given in the website. I found the flag.
Fig.No.12: Flag-5
Flag 5: FLAG_CMRCET_5{PH1SH1NG_1S_D4NG3R}
For every website there is a place where all the important files of the website are
hidden. It depends on the developer whether he has allowed access to the public to
view those files or not. This hidden place is a vulnerability if its exposed to public.
To go to that hidden place we have type /robots.txt at the end of the
URL./robots.txt is a place where all the files are hidden.
https://csclub-cmrcet.github.io/startupCTF/robots.txt
Here they given a path if we type this path in the URL, we can find the last flag.
https://csclub-cmrcet.github.io/startupCTF/secret/loot.txt
Fig.No.13: Flag-6
Flag 6: FLAG_CMRCET_6{R0b0t5_4R3_G00D}
In this way I found all the flags and successfully conducted the test.
FLOW CHART
CHAPTER-3
RESULTS:
CONCLUSION:
This is a skill which cannot be acquired overnight. Lot of dedication and hard work
is required. Patience is the most important skill to acquire this. Penetration testing
help to mitigate the threats of all the risks that an application can face. However,
good practices should be adopted in order it secure any type of application.
Carelessness leads you into big troubles.
REFERENCES
https://osintframework.com/
https://medium.com/@shibinbshaji007/introduction-to-web-application-
penetration-testing-9ebb058b8b03
https://www.synopsys.com/glossary/what-is-ethical-hacking.html
https://ciso.economictimes.indiatimes.com/news/37-increase-in-
cyberattacks-in-india-in-q1-2020-report/75962696
https://www.edureka.co/blog/ethical-hacking-career/
APPENDIX
Ethical Hacking is a vast subject and it requires lot of dedication and hard work to
acquire this skill. According to a firm, India has seen 37% increase in cyberattacks
in first quarter of 2020 compared to the last quarter of 2019. The Kaspersky
Security Network (KSN) report showed that its products detected and blocked
52,820,874 local cyber threats in India between January to March this year.
The data also shows that India now ranks 27th globally in the number of web-
threats detected by the company in Q1 2020 as compared to when it ranked on the
32nd position globally in Q4 2019.
JOBS: Growing at a rate that is outpacing all other areas of IT, cybersecurity has
emerged as a high-growth-field of 2017, and possibly of the entire decade. During
the 5 years between 2012 and 2017, listings for cybersecurity jobs increased by a
whopping 75% according to the analysis made by the Bureau of Labor Statistics.
This has led to a lot of unfilled positions so jobs are plenty and they pay well
too. Certified ethical hackers make an average annual income of $80,074,
according to PayScale. The average starting salary for a certified ethical hacker is
$95,000, according to EC-Council senior director Steven Graham.