Micro Project
Micro Project
Micro Project
In
Submitted by
(Autonomous)
2020-2021
Website Penetration Testing
CERTIFICATE
This is to certify that the course project report entitled “Website Penetration Testing” is a
bonafide work done by SREEHARI YERMAL (18H51A04M0) of III B. Tech, V semester
in partial fulfillment of the requirements for the award of the degree of Bachelor of
Technology, submitted to Department of Electronics and Communication Engineering,
CMR College of Engineering & Technology, Hyderabad during the Academic Year 2020-
21.
ACKNOWLEDGEMENT
We are highly indebted and grateful to our guide Mr. Abdul Subhani Shaik, Associate Professor,
Department of ECE, CMRCET for his excellent guidance and constant encouragement
throughout for the successful completion of the Project.
We are obliged and grateful to thank, Mr. E.N.V. PURNA CHANDRA RAO HOD, Department
of ECE, CMRCET, for his cooperation in all respects.
We are obliged and grateful to thank, Dr. B. LOKESHWAR RAO, Dean (Academics),
CMRCET, for his cooperation in all aspects.
We would like to thank Major Dr.VA NARAYANA, Principal, CMRCET, for his support in the
course of this project work.
We would like to thank Sri Ch. GOPAL REDDY garu, Secretary& Correspondent of CMRCET,
for his cooperation in all respects during the course.
It gives immense pleasure in expressing our deep sense of gratitude to project In charge, Mr. P.
RAVEENDRABABU, Associate Professor, Department of ECE, & project Coordinator Mr. C.
Veeranjaneyulu, Associate Professor, Department of ECE CMRCET for their valuable
suggestions in each and every review during the course of my project.
Finally, we would like to thank all teaching & non- teaching staff members of the department,
for their cooperation and support throughout the duration of our course.
Ultimately, we own all our success to our beloved parents, whose vision, love and inspiration has
made us to reach out for these glories.
SIGNATURE
DECLARATION
ABSTRACT
Now a days we see many cyberattacks happening at our surroundings. We hear or read
some news articles that there was a security breach and we also listen that some familiar
people’s social media account got hacked. The main aim of this project is to alert the
people about the cyberattacks going on in this world by conducting a penetration test. In
this test we have three main stages namely information gathering, search for
vulnerabilities, and exploit those vulnerabilities.
We perform these kinds of tests to test the security of the application and update the
security measures of the application. This kind of tests helps the ethical hackers to
improve their cyber-defense capability. We can create awareness among the people by
showing this kind of tests so that people will come to know about the basic security
measures and they will be cautious all the time regarding their information security.
Index:
3.1 Result 19
3.2 Conclusion 19
4 Reference 20
Appendix 20
CHAPTER 1:
INTRODUCTION:
OBJECTIVE:
Ethical hacking is a key component of risk evaluation, auditing, and counter-frauds. The
scope for the Ethical Hackers is high and it is one of the rapidly growing careers at
present as many malicious attackers cause a threat to the business and its networks.
Industries like Information Technology and Banking Sectors hire several Ethical hackers
to protect their data and infrastructure. Also, in the upcoming days, the demand for this
profile is going to be high compared to other profiles due to an increased threat of
vulnerabilities.
We also know that the number of cyberattacks is increasing drastically day by day so,
there will be lot of scope for the ethical hackers in future. Employment of cybersecurity
analysis projected to grow 32% from 2018-2028. In USA the average advertised salary
for a cybersecurity job is now $93,560, which is 16% higher than the average salary of all
IT jobs.
REQUIREMENTS:
CHAPTER 2:
IMPLEMENTATION:
INTRODUCTION:
Penetration testing is a type of security testing that is used to test the insecurity of an
application. It is conducted to find the security risk which might be present in the system.
If a system is not secured, then any attacker can disrupt or take authorized access to that
system. Security risk is normally an accidental error that occurs while developing and
implementing the software. For example, configuration errors, design errors, and
software bugs, etc.
There are three main stages in a penetration test. They are:
Identifying Vulnerabilities
In this stage, we have to find out the vulnerabilities of the website. Vulnerabilities
are nothing but the weak points which an attacker can take the advantage of it. There are
some characters if we type it on the website it shows some weird actions on the website.
The tools used for analyzing the weird actions of a website are Burp suite, OWASP,
Wireshark etc.
Exploiting
This is the final stage of a penetration test. The information that we have gathered,
the vulnerabilities that we identified, will help us in this stage. Exploitation is the process
of taking advantage of the vulnerabilities to do some serious damage or to find out the
extent to which a vulnerability can be misused. Exploitation might not be that much easy.
Sometimes, multiple vulnerabilities need to be chained together to perform an
exploitation. Perfect execution of these attacks might require some good amount of
experience.
METHODOLOGY:
The website which was given to us to conduct a penetration test is mentioned below.
URL: https://csclub-cmrcet.github.io/startupCTF/index.html
When we click on the above URL you can see the website and as you observe keenly at
the about us page you will be able to find the owner of this website. The owner of this
website is Fred Krueger.
We used some Open-Source Intelligence (OSINT) tools to gather the owner information.
We came to know the id of the owner and the id is “kruegster1990”. We started digging
out the information about the owner using some of OSINT tools. Finally, we came to
know that he has some social media accounts such as Instagram and twitter. The look of
the website and the owner’s social media handles are shown below.
Fig.No.1: Website
If we observe his twitter profile clearly, we can find a lot of information about the owner.
The owner lives in a place called Silver Spring, Maryland. The owner was born on 1990.
This was the basic information about the owner.
http://www.cornerstoneairlines.co/
This was the website mentioned in his twitter profile. But the website isn’t working. The
name suggests that he used to run an airlines company which was found in the year 2018
in U.S. This website worked for a year and 8 months.
When we observe his Instagram handle, we found a flight ticket he was travelling from
Baltimore to San-Francisco and it’s a first-class ticket.
We have gathered the owner’s information successfully with the help of Open-Source
Intelligence (OSINT) tools.
There were 6 flags hidden in this website. Let’s find out those hidden flags.
Fig.No.5: Flag-1
I thought the second code will be in JavaScript files. So, to find the JavaScript files we
have to go to the inspect element tab. Right click anywhere on the website and click on
inspect element option. In the right side you will find a tab. Go to the networks tab and it
asks us to refresh the page. Do as it said and you will find many files of the website. In
the top, click on JS then, you will find all the JavaScript files. I’ve checked the files one
by one thoroughly and I was successful in finding the second flag. It was hidden in
plugins.js file.
Flag 2: FLAG_CMRCET_2{3ASY_P3SY_J4V4SCR1PT}
Fig.No.7: Flag-2
There is a login option at the top of the website. I thought if I login to the website I can
find the third flag. We don’t know the credentials of the login page. There is a way to
bypass this login page. We need to go inspect element tab then go to networks tab and
find the login.html file. The login page looks like this.
I thought if I edit this then I can login to this website as an administrator. I’ve added an
extra cookie which to this file and click on send button.
Cookie:password=;username=admin;admin=True
I found flags in source code and JavaScript file. So, I thought I can find a flag in a CSS
file. I again visited the inspect element and this time I checked all the CSS files
thoroughly. I was successful in finding the fourth flag.
Flag4: FLAG_CMRCET_4{M4ST3R_1NSP3CT_3L3M3NT }
Fig.No.11: Flag-4
For the fifth flag I have sent a phishing mail to the mail id which was provided in the
about us page.
This was the mail which I sent to the mail id given in the website. I found the flag.
Fig.No.12: Flag-5
Flag 5: FLAG_CMRCET_5{PH1SH1NG_1S_D4NG3R}
For every website there is a place where all the important files of the website are hidden.
It depends on the developer whether he has allowed access to the public to view those
files or not. This hidden place is a vulnerability if its exposed to public. To go to that
hidden place we have type /robots.txt at the end of the URL./robots.txt is a place where
all the files are hidden.
https://csclub-cmrcet.github.io/startupCTF/robots.txt
Here they given a path if we type this path in the URL, we can find the last flag.
https://csclub-cmrcet.github.io/startupCTF/secret/loot.txt
Fig.No.13: Flag-6
Flag 6: FLAG_CMRCET_6{R0b0t5_4R3_G00D}
In this way I found all the flags and successfully conducted the test.
FLOW CHART
CHAPTER-3
RESULTS:
CONCLUSION:
This is a skill which cannot be acquired overnight. Lot of dedication and hard work is
required. Patience is the most important skill to acquire this. Penetration testing help to
mitigate the threats of all the risks that an application can face. However, good practices
should be adopted in order it secure any type of application. Carelessness leads you into
big troubles.
REFERENCES
https://osintframework.com/
https://medium.com/@shibinbshaji007/introduction-to-web-application-
penetration-testing-9ebb058b8b03
https://www.synopsys.com/glossary/what-is-ethical-hacking.html
https://ciso.economictimes.indiatimes.com/news/37-increase-in-
cyberattacks-in-india-in-q1-2020-report/75962696
https://www.edureka.co/blog/ethical-hacking-career/
APPENDIX
Ethical Hacking is a vast subject and it requires lot of dedication and hard work to
acquire this skill. According to a firm, India has seen 37% increase in cyberattacks in first
quarter of 2020 compared to the last quarter of 2019. The Kaspersky Security Network
(KSN) report showed that its products detected and blocked 52,820,874 local cyber
threats in India
Between January to March this year.
The data also shows that India now ranks 27th globally in the number of web-threats
detected by the company in Q1 2020 as compared to when it ranked on the 32nd position
globally in Q4 2019.
JOBS: Growing at a rate that is outpacing all other areas of IT, cybersecurity has emerged
as a high-growth-field of 2017, and possibly of the entire decade. During the 5 years
between 2012 and 2017, listings for cybersecurity jobs increased by a whopping 75%
according to the analysis made by the Bureau of Labor Statistics. This has led to a lot of
unfilled positions so jobs are plenty and they pay well too. Certified ethical hackers make
an average annual income of $80,074, according to PayScale. The average starting salary
for a certified ethical hacker is $95,000, according to EC-Council senior director Steven
Graham.