Introduction to Offensive Security

Web Application Security

Security Risks

  • Identification and Authentication Failure
    • brute forcing
    • weak passwords
    • storing passwords in plain text
  • Broken Access Control
    • failing to apply principle of least privilege
    • modify someone elses account
    • ability to browse pages that require authentication
  • Injection
    • inserting malicious code as part of input
    • lack of proper validation and sanitization
  • Cryptographic Failures
    • sending sensitive data in clear text
    • relying on weak cryptographic algorithms
    • using default or weak keys

Network Security

Lockheed Martin - Cyber Kill Chain®

  1. Recon
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command & Control (C2)
  7. Actions

Example

  1. Recon using nmap –> got three results: 21 open ftp, 22 open ssh, 80 open http
  2. Try ftp using ftp and anonymous login –> found file secret.txt –> download
  3. Got password ABC789xyz123 from file
  4. Try password for root account
  5. ? ? ?
  6. Profit
Last modified 2023.10.12