Introduction to Offensive Security
Web Application Security
Security Risks
- Identification and Authentication Failure
- brute forcing
- weak passwords
- storing passwords in plain text
- Broken Access Control
- failing to apply principle of least privilege
- modify someone elses account
- ability to browse pages that require authentication
- Injection
- inserting malicious code as part of input
- lack of proper validation and sanitization
- Cryptographic Failures
- sending sensitive data in clear text
- relying on weak cryptographic algorithms
- using default or weak keys
Network Security
Lockheed Martin - Cyber Kill Chain®
- Recon
- Weaponization
- Delivery
- Exploitation
- Installation
- Command & Control (C2)
- Actions
Example
- Recon using
nmap
–> got three results: 21 open ftp, 22 open ssh, 80 open http - Try ftp using
ftp
and anonymous
login –> found file secret.txt
–> download - Got password
ABC789xyz123
from file - Try password for
root
account - ? ? ?
- Profit
Last modified 2023.10.12