Week 2 Penetration Testing Report
Week 2 Penetration Testing Report
Week 2 Penetration Testing Report
Introduction
This report document hereby describes the proceedings and results of a Black Box security
assessment conducted against the Week {2} Labs. The report hereby lists the findings and
corresponding best practice mitigation actions and recommendations.
1. Objective
The objective of the assessment was to uncover vulnerabilities in the Week {2} Labs and
provide a final security assessment report comprising vulnerabilities, remediation strategy
and recommendation guidelines to help mitigate the identified vulnerabilities and risks
during the activity.
2. Scope
This section defines the scope and boundaries of the project.
3. Summary
Outlined is a Black Box Application Security assessment for the Week {2} Labs.
Medium - File Content And HTML Injection A Perfect Pair!, Injecting HTML Using
URL,Re-Hijack!
Low - HTML's Are Easy, Let Me Store Them! , File Names Are Also Vulnerable!
,Let's Hijack!
1. {Click Jacking}
1.1. {Let's Hijack!}
Reference Risk Rating
{Lets hijack} Low
Tools Used
Security headers
Vulnerability Description
Clickjacking, also known as a “UI redress attack” is an interface-based attack in which a user is
tricked into clicking on actionable content on a hidden website by clicking on some other content
in a decoy website. In simple words, an attacker uses multiple transparent or opaque layers to
trick a user into clicking on a button or link on another page when they were intending to click
on the top level page.
Suggested Countermeasures
Content Security Policy (CSP)
References
https://owasp.org/www-community/attacks/Clickjacking
Proof of Concept
This section contains the proof of the above vulnerabilities as the screenshot of the
vulnerability of the lab
1.2. {Re-Hijack!}
Reference Risk Rating
{Re-Hijack!} Medium
Tools Used
hacktify labs
Vulnerability Description
Clickjacking, also known as a “UI redress attack” is an interface-based attack in which a user is
tricked into clicking on actionable content on a hidden website by clicking on some other content
in a decoy website.
How It Was Discovered
Automated Tools
Vulnerable URLs
https://owasp.org/www-community/attacks/Clickjacking
Consequences of not Fixing the Issue
What will be the consequences if the vulnerability is not patched?
Suggested Countermeasures
Attackers may abuse clickjacking vulnerabilities for many different purposes:
To gain followers on social media and then, possibly, sell the social media account/page for
mass marketing.
References
https://owasp.org/www-community/attacks/Clickjacking
Proof of Concept
2. {HTML Injection )}
2.1. {Sub-lab-1 Name}
Reference Risk Rating
{HTML's Are Easy!} Low
Tools Used
hacktify labs
Vulnerability Description
HTML stands for Hypertext Markup Language.It is a standard markup language for web pages.
Collection of web pages makes a website. HTML elements are represented by <> tags. Where
each tag has a different working.
Proof of Concept
NOTES:
● Everything mentioned inside {} has to be changed based on your week, labs and
sub-labs.
● If you have 2 labs in same week you need to mention that, if not ignore those
mentions for lab 2.
● Here it is given with 2 Sub-labs vulnerability, you need to add all the sub-labs based
on your labs.
● Don’t forget to add the screenshot of the vulnerability in the proof of concept.
● Add only 1 screenshot in the Proof of Concept section.
● This NOTE session is only for your reference, don’t forget to delete this in the
report you submit.