You are on page 1of 33

UNTTg

vg pto graphy: Ccrgpteg"phy, Digital Signature, Harh


Punetions, Steganography: steganogiaphy, procecs,
atar maytig, Steganog raphy Hethody and Attecks,
Steganography tods
tools elnerability Assessment:
Vulnerabil:ty,the open hJeb Applteation Secotity
Projeet ( Ow Asp), Berention, Damn Vadnerable
Welb
tppitaton C
DV wA) installation and tertig
d DUwA.
Cryptegnphy:

Crypgrephy is a techniqua cshich is used


Communi cativn by changing he
for the Secured
mess ag e or intor mation into encoded -format.
Used to enerypt
Some special algorithms Ye
he
int bna tion and the nbrmation exchange
be came SecUre.
cryptgraphy are
xed in
-
H The algorithms
algorítbms_ and Conveyts he plain
mathe matical
into unreadable coded foint
teat înfrnoation
tohich sis knocon 4
Cipher tet.
information is encrypted by usig 4a key
The
lchich
ma kes
it more Secure,
the
H Receiver ould not be able to decrypt
knooirg
Used to
infrmatan wthoct
wt
encrypt the înfrmation,
Keys
J. publie key
. Private Key.

I. public key:
In the publie key, tse data Is encrypted
Using the recipient .:
be decrypted otthoit
'
puble key and t can't
metehing the prtvate ky.
Here, One Key is ncypts tee plais teat and
another key decrypts the cipher tut.
will not oork it interch anged,
D the Nocking key is puble than aryone
Can Send he
encrypted intormation to the
prvate deerypting the irfor
key hofder but
mati on would not be posible wthout
the private Key.
enhanas the conkdon tiality
Hence
Communi
it cation,
dthe
9, Paivate key:
data is encrypted
In tte prív ete key

and
te,
Can be dearypked ody
the prvate
key

matching pubie key.


by the
the kays wll not work if interehanged.
the
ocking key s prvate, it Ued to vrif
-that the document s locked by
the ooney and
hence.
it is mostly used in making dittal d
Siynatures.
-
having
The intoronotion Can
be deeypted by the User
matching pubhc key of
the cipher tot.
cohile Commonitation, the pubie kay it published
twhereas the private key is kept Contidential betuee
the Sender and receiver.
The inform atiorn Can only be
decypted the
private koy presurt but the
but the one sided
encrypted messaged Can be sent using
he
pubie key.

The fecurtty and Confidentiality is totlty


dependernt ypon
private y.
There are too
terms which play an imporbant
tuo
Yole in Cryptogyapky:

.1. Energptin
Deeryption
.Encryption
Jo the eneryplion, the inlrmation praent
5 plain text is encaded Using Speihe alyoa
by means
4 key.
The infovnation cohich i obtained ag'an output
is kno wn ag encry pted data.
en crypted g
he infor matin cipher
tent and olan tett is considered a Uhen eryoted

in-formation.
encnyeted intoMation there should
1o accesS the
the
be private tey present by which deeryption te
Can be done.
to the intomatin;
Hence t en ab les more Secority
trans furtd.
the tey enabled less
Use priyate
on
eplai tatihon and Compro alSing Yisks.

b. Deoyption
Decryption s the process eovertiong the
ipher
C
tot into plain teub.
Ln the decyption,the reeivey
process
decades the encrygted infonatiog by vring toe koy
shaed.
decrypt the ihformtion presente d priate
is must.
ehergyption and deyptn wake p
Both term cryptogrpy.
ohole
Digital Signature:

Diyit) Sgncture i csed to defring


te
authenticity ahgiel dooments.
upon
IEthe cer
is based
locks
private ky eneyptio beauje
the docoment by osing by digital
hig
Signature.
is an
User
Diqita
which
signature electrie Sinatore o the
is used fo Secore digital purposes
and used or authen ticatim Coniden tial nfermation.

To qenerate a rando private koy, a Py


Jenerat ion algorth-o is Used which selet a
random
key trom he possi bk keys.
Generated private key and s Corm bincd
inotion
sig natre
b vsig he
algorith in
Siynigalgorithm, hinaly
is used which checks whether
Ver
ityig (

the public matching not.


ky k
the
h Case, -te puble key matehes with

private F, authen ticty s defned.


Lidely used n goveinment
Digital Siynturs are

Sector releted workS.


Function s
:

Hash
Hagh uneticns alto defned ay one-oy
re

u
tunctiong there k ho in volve ent
In the hah
of the tay during the encgpêion process.

The plain
tet Snfeor watiom Is Conveted ioto hash
by the sultable algori fhs.
The ploin taxt is non-recoverable bom fhe has h
-hncioo because the hashes are OeDne-tony property
Important Cyptogrephy Algori th ms

1. Rtvest Shani adleman (RsA)


. MOS
Hashig Agotbig (stHA)
3. Secore
shamir dlekan CRA):
baged
Fast publie ky
RsA
is the very coidely ured for

C'Jptegraphie Systens andcohich is


the SeUro d dat trans missi on.
RsA, a User genertes a publie key
In the
pen numbers having
based tuo large prime

auziliary Vabu.
generate d public key keeping
Usor public hes the
the prime numberg Secret.
ay can
publie bay
publie can be dted by
The publighed
pub
e nery pting the inbrmein.
Decoding
the PsA eneryption is
ay KSA
probeu.
genealy Enocon

one
Ps A
the slowest agorithns and
due to his Is hot much usedfoy energtig theuser.
MDs caiddy óre
úse dd
hashig algoritaa for
generatirg
hrbit hash.
Jenery used y a data
veriheattn
Unintentional coYruptions.
MO ne lway hash tuncfion but it
but it Can

be cracked or reversed by
using Brute - Porce
Atacks.
nessage
MD is the advaned Seiee
digest funetions.
mds hauh
n
the Secuity pot d vies,
Securidy had Com proni sed Many tines.
Usig olision atacks made possible
it to
CYack ds hach.

3. Secure Hashing
Algartto:
SHÀ is q hashig algorith io ohich tatey an

ari trary ength.


he out d SHA l6o-bi ayd it
quite slow -than mds.
Jenerally used for he Authenticatioy
eeyp tion pposes.
- H

foy Seored
is
also
web
used fr
conneetong.
nfegrity checksung and

jenerndy biyger than bds i legt,


SHA
Versions sHA are

SHA-1

SHA 3.
Practical
I. True Cryet:
Doconload # troy
www. druve rget. orgdowntoads
NoTE: TrueCrypt is not used in ltest Vers ion

-
and it
windows.
Bit
is
o cter s
pre-londed.
introdoced for encrgption

Using Trve Crygt:

Docon load and instal TrueCrypt.


dyiuers.
Select drive and click 0n mounl,
you Can choose specate kleg to encrypt

hew.
a. Online
MDS Encvyptiony

Open your web broLDser


toeb broaser and visst to
oww, mds encr yption. Com.

2 Dnput bessage which yoU want to encrypt


and clck. on encypt T,

Por Bxy- Hello.


be generated
3, The MDS hash wl
for Ex:

fsl493999 bee229 SPPfosfooesosdab.


4, This uwore
sed in ekanple
ekanple is a horwal dhctonary
Coord ond Can be eas'ly Cacked vsing brute toe
torce.

3. Onine Mos Decryptio


Opern your web brouter and visit to
htp:/ mdsdeypt.netenl.
9. Dnput MOs Sting ohich you want
t decypt

and clics Decsypt


it
MDs hagbh he decnyuted
be
wtU deciypted and oigine
the coautd be etneued.
message
Por B Hello.

Used a hormad dickomi


this Coord example is
bnte
oord and Coy be easily Craeked
fce.
Using
SHA-4:
Open your brocoser ard go to oww.shot-online

open todbstte en ohere you


you Simple text into
Can Coner t shat hagh.
basb.
you tet, ee: belo o tg. teut is
fra g
to be a
Twart haceker d ethic and clek
6n hash button.
Now you haw your shaj hash. ! s
Can
alpha humerte hash.

Nore' you can choose otlher hash trom drop-doon

list.
S. Cing Sest:
Opon your broser go to
and ao

online con!
opey a coebsite ron where
gou
Nouw i{ oll
Can Con yert yoo)
Sinple tert to bost bath.
Dnseyt you tor b
ethies and
is T oant to be a hacker
hash buton.
chck o hae your
you la
lphanumerie hash.
dhg-douh
NOTE: you Can
choose other hahhom

list. (10)
Stega nographd

iš an avt hiding the nfouatieg


infontion
offhin the
les.
Sensitive mess ages and inforanation
ave hided into
the mutimedta fles coithourt being deteeted
process by the
¢ steganograpy.
Dt allocos nony mous
and seupe intrckange
inorm atio coittout
beig detected easiky
Thehdden infonyation is hot
chanee visible, hence tee

is mposi ble.
t
beig detected
just by Seeirg the files
Steganogrophj Can be cone wth mediakles
and folders.
stegano gapy is Sometimes Used ag an autbentication
watermar k by the digttal hyusic and moui
Companjes
ohich is invisible
ìn visible to the Users byt is
Use fal to kep authenticity.
2t is aso used by teOnst o tho Secrot
intrmatio exchanging.
D s adso popular tom he
trensics point b
Vieo and is coidely Covered under cy
ber for ensiks
Foy examble:
atacker hides Sone Con-kdantal

inorinatian wittin a pictoye Using he eganogvephg.


thin
Attacker brand neas Cay picture and upload
it ovey media
the social to Secvey wft,out Suspeieus
hess and the e ceiver al docsnload toe pickure
and ertract the nfornatiog usingy lhe toss.

Noothe attacter wll eove the picture Hom o


mdia,
h tais cobole rocess
attackeY pretended to
share
the pietores o
Secvet
ts ns
information teas shared
heu Car but actually
the
eoithout knocsledge
angone.. d
ingrnotin hadden Can be etrieved toit-the
The

hep o} stey anogrophy analysisot ohich s not a


dilfautt s k but in Case cf complen steangrgy
proce s
|-the d vetrieving -the infoalion might
hayder. be
Steqanography ProcaAs:

I. The tarqet hessSage Is fist enery pted and then


Com bined with -the target fle by the eans
Special tacls cohicl have pernmitsi ons tb nodity
the
Ailes.
9. The en cryetd kle) data s epended osts the
danget fle by using spetial alyetas vobiel,
data bidden into -the
Mabes ke Qyd yakes
iovisible o haked eyes.
3. tte inforny abin is visibk to tie Some special
aMeptiona proqras cohich ae da iyned -fr Seyane

araphg analyss.
Terms Assodetad oit teganojrphy:
J. Cover- Mediom
&. Stego - Me dium

3. Dn-vnoticn
I. Cover- Medivm
Jhe nedium in obich the
inorat'on Ôr e
dargt message sto be hidden is knoan ay coyer,
medium,
Cove mediunj is mitlal plare
the informati og should be bidden iy
decidig cohare td
the nedivy.
2. tego- Mediun :
The nediom in ohich
he infonition bror the
arget
mediuw.
mes age
Ishidden is knocon
ae eoo stego

hidden Sonse ohere nto he hnediu Gnd ths îs

net phasealter Couer brediuuy.


3. Tn
tomatin:
The plain
tert or
data ohich is to
within any prticuloy be hidden
date Aype s
is knoon ag
pertorme nbrntem
for
the seeurita
and Conkdabali
oter marking:

waterm arking is a
siilar process
-tthe
protection
the documents
by keepig
Ooner.
2t: prary goal * not to le deitroyed or
autyacted.
oater s
maYk ing geneally csed ot, mutmed'q
-rles to
pro teet the intelectual property
ig hts.
water m ay kS are adto ured rt docUhie n
tohich Visible toaternarks.
be Used to wake
Iuay the inbnston benper
proot by using 4fingorprind to tha mtorwotiey

Stegangrphy Methods

). Tadition al Methody
a, Hidden tattoos
b. Usig Loax peper
C. USin the
he nneas arheles by highlighted teut
metho d
d. Nicrodots and sy
belie Conmniatiom
9. Modern Metabdi
a. plain Tert Video
d.
b. typer Teat e. Audio
C. T'hag
elf. 9.
Prectable
Netoovk packets.
(t
foy
Modern metio ds are caidely sed thestegano-
Sraphy ond Secore nfomation enhanges,
. plain Test:

matods
Ône

J Using plain
Common
tet.
4 tegono grepy is

be done by using
plain tat steg anagnophy Can

presert în q poragraph oy
Sentence
Special hover or
tet highiyht ing is usd f
-tis ethod.
for e He I: Good Ilusionis t and Kecon
Lovet if the at Jottey each cword is taben

# will look ike :HI6TRL and fter Carefel


observat ion it clear that the mness age

or
Sometims Sone So Speuial S n beie obite
charaetert ane
uwed tohieh Jenealy not
decoded by normal tent view arf ayd h ence
are Used
SReganagraphy.

J. Hyper Teut:
Hyper Teet is Shaib
Stegan ography bated on

to
o plain tet.
Generally toe message is hidden ottliy the fkl
Com
Using the Comments jeerally hot vistble
norma and hence Can be wewed
to Uer
hence
code and
.
in speetion Source
might be -used
tr stug anogr «phy
s cure
ths casethe
Dn etho not much Se

becaue Cn advanced uer Can eas ily detet this


Stganography
isnages
Sometimes it may present within the phrater,
any other page Content etings
B. Audio:
Audio steg anogrephyi oge d he gost Comsly
Used
techniques,c
Dt Can te doe by diyitally embedding a ke into
Cudio piles hidirg ny nformatig chgtly oithin
Hehudio le cah
which Can be'eutated dir
add:tional musi^
Creating Some
be done by
y
2H Can

additional musiè
eg uence
syuince oy the shet.
0Y
hotey
enbedtig a hmeslage
Digtal embeddig is a process

into audio
-fles..
Ued for eaed ding the mecsage
Redundant bits are

into the fles. inacurete date rate


Since au dio
audio is
one
one
d the. be eastly detected,
changes in the bits cn't
sli,tt for
Generly least sigrhcant bits one
are generaly used
Yed undant bits.

4. Video
Messages iand intoretion Can be tidden inside
5Uideo stegahogr ap hy is widely urod for the Secret
information nterchonge.
4

steymog raphy.
is Somecalbat Stilar t the hyperteut

Can
Unlike
adso
te
be
au dio and video Stegnographa, messags
hidden ing Sight diferest Cdours
cokich Can't be
deteeted easthy by vis aa Look up.

SS, Tmage:
Most connmen and cotdely
coi dely sed techmize ts inmage

tegonograpby
An image ured to hide the data and infmckton
's
wifhin iH.
from he close ingpetion ó1 naked eye inspehon,
-the bidden intortion Cort be detted just Lte
audio and video Steg anogrephy.
6. Exewtable Files
Stegonegy Con be done tofth
te helo eueoutabld

desiyncd UKed -tooty to bide


Jome speially are
info maton wilain the exeutable iles.
Uses vedondant btte tor toa Stegagnphy
the eneutable tile s not afected the hidden by

dofa aad also there s no Višual detecien 4 teya

nogrepy in 1E.
Steqanay sis
Stegonabyas k the procrs anabysng and
dete ting skyarneyrnphy
Sone Speia! tachntyuá, and toos

Stej malyeis.
Generally
-iete
statista! analytis vred to he
Shegenography cetecton.

Stuganalysi Atacks
Stego -only Attack

d. Cover Attack
3. Visual Detetion.

Dn type only the stego hle


tis dt adtack
availa ble totte attacker.
an can ondy acess
he tgo
Dt means that aackey
retreve the hidden mesae.
kle to
. Cover Atack:
atlack er Compareg
an the original-fle
Cover
with Slego Ale to oktct the pettern ckFferncef,
ey:
for An. originad and Skgo hange t compared to kn

Fie patern Variance in that to find cwhcter the


Steynographj îs done oT
hot.
3. Vsual Detehon:
algo be detected by Using itual
Skegnogapby Can

|Doobep.
Semetimes the
nuel Variance and paterng Can Qoadto
-tee failore and deteckion de steganogphy.
Generaly cue to lack d proper ncrypting witlin the
t is detectad by dhe
innage.
Spuilly, in case eshen the segonegrphy s done

Using coaur Variance.


Steganegrphy Csing tosls:

DoJNLOAD: btp:/ mabsoft.


Us ing Net Tools:
co/het kods. htm
in Salation fr beginnf
(a) Net Tools is
the al bne

ell a intermediate urerg. D


Cortains more
-hay
loo fodls frx chacking
Gmplte tole:t
pactoge
b). Dt also condoins Steganoqaphy
tosle. o
pertorn teganogrphy using NetTocte.

() Doanload ond Run NetTo here ir drop doun


Mieny
hamed to trom there cheose Seg anogrphy.
d Now click
Mage h
which yoU ant -to hide a message. Tn tae esge bon
enter me scaye you want to hide on
and click hide
tet.
Save -the iuage, output inage tll contain
Now
your seeret megsage.

Now you want to erfrach mesage jut load


|e).
the inage and clic eutract tmage.
()
image contains ainy
messge
it asll get Sepantd
and daglaygd.
td there for
tols prget ih nettds
tagangaply try auploring then,

2, Qutct Stego:
DocOn LoAD: ww0, CylbernesCernte
UsPNG Quict Stego!
Pirstlhy doconload and Run BickStege. TH is ery
Simple te e and haue Uer fndly ntenfae
o on open inage
clic k
to pan the nage
you (oant to hidea message or teat le.
yo
cicle open teat to cpa, the tent kle want

to hide or type a message bou,


nersayeh
neco nessaye

dy click on Saue inage to Save.


message hidden in it.
it tl coais Chenet

e) Kboto eutract mesiage, Load inag


n
etract message the inage Contg any
bidden messge
esage, It otll be ertyacted.

(20)
Vulnerabidty Assessment
Vulnerab:lby :
Vulnerabiliby is
eakness pregent in any
H
Vulnerabi lity gives yeteu
attacker advontage
dhe target to use it to euplot
Systent.,
Just lite human gett 4 dksease
because deticney
OY. weakness
tn immune Systew,
actally lnerab:lity tis eaknest is
In immune Systey and a chsease
USeg dhrealel
tt weakness to Spread into
human body.
Vulnera bilby
Reads
s a Weakness cwhich
enpleitahon
yatey,
vakneralbtlty is adho termed ag leop lhob or
A bug s a dechnical error
due to colhieh a Systey
b
oT Sesvle becane vulnetable.
vulnerab:laty may be due
to huon error
due to miss Aimes
i Codes
Improper
dealop ant.
Valne rabikty is a sign donger, more -he
vulne rabikty are
associated oth he syste, lecs
Security is associated.
Vulnrab: kity tyrs.
A Nes 4rsco verad ag
Vulnaability is Fhocon
V

2e RO -DAY.
honce e
H 2ero- day s Bresh valnorablt and
high chan eg that it kauy be tooo d
in al 4
the appli ation.

Pnetraton testing ic all dependent pon Vubnbiby


systeny is vuknenble, eploitation Could
Da
be done.
complete phase a penka Eton tertine,
Dn the
to
d
identfy the vulnerabrlit
atacker frt te!
cnd then exploits the System by te
adr ontage he Same vuknerabitty.
Valnerabilby
Gen
eyly the pen ebation tatig ond
done
assess ment in follooing:
I. web Aephcat on Ponetrabion Teting.
on
2.
Ntork aud Server Side penebti teting
3 Andkoid Applation ponetr ebm testig
pen etroton tetfing.
4. Pos -Aplicaton
S. chent side penetraten tuting.
Ye coards Yesearche rg
comp
Almost evey, prasont in
reporting the bugs
and
websitey or plictiong
their d eoney
Rewards may be in he

good iet
Reseye her aloo warded oitt eir Name in
hal fame.
Compang'i
due to
This became Vry intoresting Bl d
(Y
Yesearch ert
this s Completely wkite hat and
adso get a ewayded.
disclaror
Many hecomers UYe

Vunrab:ktie are
defned te basis
d
t.ret level.
te s a
stondard who de fneg the Aist

Thee es eyery -hrae Jears.


top vaknesa biltiej by cfet
„ded
teloarded
acordi
Researcher'y odings are
-to the type 4 bug ound.
found, high amovst s
Generaly, it top bugs are
seor chag
reseay along cott hall o amet
paid to he chers
and godid.
nocon ay BuG. BoUNTY o7 BuG
This is aso

HUNTDNG.
g kant Nicraceft,
There are bnany
big lee
Google, Fate book, ete.
bug bounty progra
ns their b
runs
every yenr.
is defined by the O cAce
valne rabikty lot
The Open Web trplicatiog Seunity Prajeet

(ow ASP)
internaional Source
OWASP is op
ckelaeg the lut
foundatorn Ouasp
Valnera btlbes on
he bsis d threst level and isk
factoy.
Thic
ist is lenoon ay OwAs Top l0.
OwAsp Top lo vuknerabilities eeognized
the standardvulnerabilty st.
Threat fonn -tore valnerab; lities s wery high
and caue potentia! damage to -le coeb oppliti
for Nobtle
OwAsp aleo declares dhe it
valnembility tožts the nabne d h owAsp Mobile
Secority Preject.
open
2ed Atect Prony CeAp) s one d the
owAsp
Soorce oolUsedBr penetrati on testing.
is availa ble onine for tree.
to autoetically d secortty
4 P helps the user
in the target webstte.
Valnerabiltiy
Thx is mostly Ureful when you want to tet
deulapirg cb aplicatins.
penetrati og
is algo usedo wanaal
OwASp 2Ap.
by proest onay hi
besting and generally kd
manual testig.
in kali Ainox
Comes
nes
preistalled
Ow Asp PZP1o (20ts
OwASp Top

DwASP Top to is tagship prejet d

Ow Asp foun dations. is


the lst o yos t
Prevention

Best practise preventig the injectiog foss


to oCcur tn a
eb applitatten is keeping the
Dntrated. date tltored and kepirg Šeparate fom
Command nd queries,
Seaoe coding is used doring the denl-pment
4
Lsb aplicahicn.
By ohich -fterg Qre dekne toithin the ioternal
So thet the injection
Codig flas an be prauanted

Due many web plcaton Ues s bated


dota bset,, quide ecommended to restrict
4is the

ade to alloo Queries.


ATe the cwelb applcation otll not be vestic ted, tere
are huge Chant eg Compromise
d to the deto bteg
wbole coeb application,

Some 4 toe prenention mechanismg Caceoyding

to Ooasp):
USe
d
Sate ApT which avoide
the use 4 interpter
Cmpletdy and restricts the queries to get eHecvted.
Care hdly ercape special, charactrs sing te ipeti
escape Synten Should be used So that input ean bel
Tertrieted.
white lict input Can alko be ured oheh deny.
he unauthoried input and hente kess chonte
ate over. (26)
tveaten ing vulner abilithy which CAYe
foond in

web agplitati ons.


OwAsp edeknes Top to List fom very fhree
yeor.
Alng uoth de ist top to critical valneab:ltek
it providey te cobole doconenttion to learn and
test r Ahee Setortty ulnabi fes in koebappliato.

completely open
H Ths preject is SoUrce.
AM he penetatiog tester ard bug bounty
hunters follo uos OtoA sp
Top lo Velneabilty
Staodard cohik testirg coeb applicaf ion,
Prjects are open Source qDareness
pnpose.
Folboing are -he top lo vulnera bil:tieg
1. Tnijecten
A.
Rroken Authenticatien and Sessiovy onagement.
s. Cross - Site Senpting Cxss).
4. Ihsecore Dired okjet Referentes,

S. Saconty Msconguatien.
6. Sensttive Data Papas ure. oS

Mising function Level Acers Cnlrd.


4
Cyoss- Stte Rosuest
forgery CCSR
knouJn
P).
Vealnerabikity.
9. Using Comporents aoitl,
Jo. Un-Valideted Redirect cnd forcsards

25
Prevention :

Bect pactse pranting tie injectag tousg


to occur în a web applitatim is kesping dhe
keepirg Separete heoy
Untruted dete klterrd and
Command and quer ies,
Secore coding is used dong the deulpent
web aplicetion.
By which flterg ane efne otthin lhe întenal
Codi ng
So
that tle njechon flaws can be preuastel

many web applcaton Uses


gl based
Due t
is quite ecommende d to estriet the
lata bajef,
Code to
it
alao gueried.
not be vertnie ted,-tf.ere
the
Thuge cueb application sil
chanteg d Compromise sto ho dede baset
are
whole coeb appliation,
prenention mechanism Cactoyding
Some the
to ooasp):
1. Use dt Sate ApT ohich avoide the ose d interprter
Completely ond restricts the queries to get erecvted.

a. Caefley escape special, characterg utig te tia soeiti


so thet input ean be
be Used So
De
escape Syntan Shold
Yestrieted.
3. ohite Rictinput Can aloo be used tohrh deny
-A unauthorized input and hente Mers chane 6
(26)
take over.
A

Broken Aathenticatin and Ses ion Managomardt:

Broken Adhenticatim and sessien Manageneut


Comes after the njetion Vlnerability in -the lit
d Ouwasp top lo.
4 Hhe threat ening valherablety
again One
ohich nay Teslt into Complete hast takeoucr
Eplot ting sing this vulneabiltty i neither
easy hor hard.
Generally aftacker explotte using the flaws preteat
during te authentication ih Sesion manogement
-funebon like Sesi en ids, ete. fy complote hat
or particolar Usel aceunt take oWer
-found due to the mpreper
be Impreper Calling

tnetion and mpepe


Iproper datr handliny ding
Coding or
fess Secority steps aken
-the
Hocw to check Broken Authenticalio and Session

Management:
1. o be clearly visible in the URL.
Session hray
a Session Dds valnerabe -to Sescion time
are
Suatiom.
|3. User authentication and Sesicorn hnagement tok
aYe
not invalalated during tae Sogout.

. Session.

Unenerypted
timeout.

network lrans mlssiong


ransMissions are USed.
6. Weak Crecdentials ar altecard
llocoed te. Weak or
Simple
Pass wonds allewed.
2. Impropr enonyplion tgorithm: are sed to encrypt
Crdontialt.
Damn Vulnerable Web Applikaton CDvwA):

Damn Valnerable Applicatien (DVwA)


bwe b
i4
specialy desigoed vudnonable ceb pplication cobich

is Used learn Yeal fime vulnerabil:ty afeasont

DvwA Cont ains ost -he vlnerabilities


tester on
A Can perfovm deating it. N is

Compltely pen Sourze priaet.


otkes ob cpplicatieng ahich
hee Many aSsets ksent
available to chect vuhe rability ltue
Sone
and penel ration testing Skily
Skily and
inage
Aes are alg o avatlabk cbict
bootable
bo run as Virfual machine.
Can
Doonlood DVwA : ltp if wsww. aas Co.
Uk/
DvwA Laal Hast:
Tnstall ig
tom
pack age toebe't
1. Do on load the DvwA #
Downlo ad AMPp to Yon DwA cn lecal hacf

Dowhla d AMpp: htpsicoo o. apoche hind.o/


docsntoad. htnl.
XAMPP Contre panel.
3. Tnstal and Ron the
28)
Apache and Mgsg l Server ron XAMpP
Y. Tnstall
Control panel and alloco they threuh trew all. Fro

contrel ponel fayt both Servers.


he
s Ertract the Dvod avchte douonlonded and put
the folder into c: \yamgp\ htdees?
6. Now DvwA cotll your Local bat.
your
# Öpen brooser and type "24. 0.0.J a
" Aocal host" to pen -the loal hast Ser
Seruer. Jhis is
goneraly ied r dhe desting eb appltstion
local Server.
|. Nauigate to Ib4. 0. 0.1/dvwa/ Joginphp'
" focal lhest lduwa/login.
php'
USername admin
Pasword : pass co
ovd.
9. A Mysql error
wil be entountaed. Noo navigate
to :"c:\xampp\ tdecs lduwaconfy inc.php
lo. open this file USig any text edter'and tind
ta, Qne: " DVWACdb pes aword'J
='Pesraor
a. chonge tlis line to the follousing:"$ DvwAC'Ab

to
l2. lou) the dvoa legin and thts
again Visit
tìme ho errot would be encounte red.

29)
|Tsting oilh DvwA!
Dnjnodion:

SQL injion is Comnen and mosl hrat


ehirg njeclion valnera bil:ly.
An atlackes injelg ho sgl 2ueriag iato chla
liatde or egjin page n
order to
-resd Dite -form

bypt he Souity and 9el aess


Sometime H
Soads to lu Complle host
-lakeover,
1. Ron puw on focal bost andl login into il.
Cich on Dvwd Security and sel H
fo low
3. clict button în lafd
on
sl injeton sidebny.
4. Input any sql 1uerin nto dhe Usep I) hod to
chet whelher

all User
Sarg brto
hto data base inpu tais
S. To See
#
query: % or 0= 0 Unin Seleet hol, user()

6. Last detaid n ohich on,


only Surname Is shown
tndicates he Usey tobo in jeckd
YoctQ localhost

the quer
7 Docontoad s cheat shect tom the intt
test deent querig and analyte
ond ty to
ochavi our,
their
Cross - site scriptin is aready anplined aboue. and
is ae one
d
the erkeal dne rabilkty.
I, Run DvwA on local hect
. click on DvwA
host and

Setuidy in
Login

det sidebar
hto it.
and st
DUwA Secortty to Louw.
3. chek on XSS, for the beginning SAart ott, toned

ss.
Name feld nput he name
4
4. InDn the
message
freld input Javsipt.

- Meisage: cserpts alet (" tHacked !")Yseript >


Sign t
Gues book. the javasuipt coflgot
and mess gp cwith
stored. Now again input hame
Guatboek.
ny thig and cict tn
coill
Subuitted earlias
The javaseript cobich wag
qet eNecoted and a ppup oil be skocon p.
6. Docsnload XSs cheat sheet Brom he enet an
Xss.
try eeotig ditfret
Cross - Site
:
Kegugt Forgery
3.
on local host and Kogin ibto it.
Ron1. DVoA

2. cliee
on DvwOA Seority tom the leff st ba
by
Low.
and Set the Secority stde bar
sPP om
3. clc Neas passoord and confivny eo
o Znput the
paswod widh
any pasroord aud cleck
change.
Por ex: harsh hash
mess age shaon belous
s. passooord changed wil bo

he change button.
ew check -the PL. hee wil) a
to stia
a
which are Separted by the 4': passo ord_he

= past coa
hash @hareh
4_ corf harsk@ horsh.
7These stings contam tte pasaord colieh hag
been Set a heo passeaord.
chonge -the pasoord praont in bote the
Striags Aike! passcond. hecd s x00pasa or d Cont

Xr00t
Alow Dvwd and try to loqn cort,
9 coil be Success fally
changed pstoor d and logji
and road abot nore
to. Vsit
advan ed Uses

You might also like