Skip to content

Instantly share code, notes, and snippets.

@venkatavamsy
Last active September 4, 2018 17:55
Show Gist options
  • Save venkatavamsy/2e43b85c41d36c1875cc83021b30ef1f to your computer and use it in GitHub Desktop.
Save venkatavamsy/2e43b85c41d36c1875cc83021b30ef1f to your computer and use it in GitHub Desktop.
Summary
Overall risk level:
High
Risk ratings:
High:
1
Medium:
2
Low:
2
Info:
5
Findings
Passwords are submitted unencrypted over the network
Login form: http://demo.testfire.net/bank/login.aspx
Details
Insecure HTTP cookies
Cookie Name Flags missing
ASP.NET_SessionId Secure
amSessionId Secure, HttpOnly
Details
Communication is not secure
http://demo.testfire.net/bank/login.aspx
admin , admin weak passwords
Details
Missing HTTP security headers
HTTP Security Header Header Role Status
X-Frame-Options Protects against Clickjacking attacks Not set
X-XSS-Protection Mitigates Cross-Site Scripting (XSS) attacks Not set
X-Content-Type-Options Prevents possible phishing or XSS attacks Not set
Details
Password auto-complete is enabled
<input id="passw" name="passw" style="width: 150px;" type="password"/>
Details
Risk description:
When password auto-complete is enabled, the browser will remember the password entered into the login form, such that it will automatically fill it next time the user tries to login.
However, if an attacker gains physical access to the victim's computer, he can retrieve the saved password from the browser's memory and use it to gain access to the victim's account in the application.
Furthermore, if the application is also vulnerable to Cross-Site Scripting, the attacker could steal the saved password remotely.
Recommendation:
We recommend you to disable the password auto-complete feature on the login forms by setting the attribute autocomplete="off" on all password fields.
More information about this issue:
https://www.owasp.org/index.php/Testing_for_Vulnerable_Remember_Password_(OTG-AUTHN-005).
Server software and technology not found
No vulnerabilities found for server-side software (missing version information)
Robots.txt file not found
No security issue found regarding client access policies
Desktop Folders Paths:
c:\website\bank\account.aspx
c:\downloads\AltoroMutual_v6\website\App_Code\LineItemTable.cs
This server's certificate is not trusted, see below for details.
Certificate uses an insecure signature. Upgrade to SHA2 to avoid browser warnings.
This server uses SSL 3, which is obsolete and insecure. Grade capped to B. MORE INFO »
This server accepts RC4 cipher, but only with older protocols. Grade capped to B.
This server does not support Forward Secrecy with the reference browsers. Grade capped to B.
This server does not support Authenticated encryption (AEAD) cipher suites. Grade capped to B.
Mitigations:
URL Validation
Sessiion Validation
Input Validation
Certificate Maitainence
Server and client Validation
It takes very less time to write a script and destroy this site.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment