Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
105
in place. OffSec was also unable to brute force user accounts
because of the robust lockout policy in place. Finally, the strong
password policy made trivial password attacks unlikely to succeed.
This points to a commendable culture of user account protections."
Listing 30 - Identifying the positives
Notice the language here. We do not say something like “It was
impossible
to upload malicious
files”, because we cannot make absolute claims without absolute evidence. We were given a
limited time and resource budget to perform our engagement and we ourselves are fallible. We
must be careful to make sure our language does not preclude the possibility that
we
were simply
unable to find a flaw that does actually exist and remains undetected.
Next, we introduce a discussion of the vulnerabilities discovered:
- "However, there were still areas of concern within the application.
OffSec was able to inject arbitrary JavaScript into the browser of
an unwitting victim that would then be run in the context of that
victim. In conjuction with the username enumeration on the login
field, there seems to be a trend of unsanitized user input compounded
by verbose error messages being returned to the user. This can lead
to some impactful issues, such as password or session stealing. It is
recommended that all input and error messages that are returned to the
user be sanitized and made generic to prevent this class of issue from
cropping up."
Yüklə
Dostları ilə paylaş: