COMP90074 Web Security
Posted ulbrr19
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了COMP90074 Web Security相关的知识,希望对你有一定的参考价值。
School of Computing and Information Systems
COMP90074: Web Security Assignment 3 - Project Plutus
Due date: No later than 11:59pm on Sunday 4th June 2023
Weight: 25% Marked out of 100
Note: All challenges have a flag in the format: FLAGsomething_here
Note: None of the challenges are related to each other. They are entirely independent.
Submission format
All students must submit a zip file with all their code. A PDF version of their penetration testing report and threat modelling report should be submitted separately. The PDF must be named <username>-assignment3-threat-modelling.pdf and <username>-assignment3-penetration-test-report.pdf. The zip must be named <username>-assignment3.zip (e.g. testuser1-assignment3.zip).
All code for each challenge must be clearly labelled and stored in a separate file, so it is not confused with the code for other challenges.
Finally, all code must be referenced within the report. This implies that there will be code in both the report and the separate code file for each task.
If you have any questions or queries, please feel free to reach out via the discussion board, or by contacting Sajeeb, Maleehah, or John.
Mandatory deliverable:
1. Threat modelling PDF report
2. Penetration test PDF report
3. Zip containing all code used
Scenario (Common for All Sections)
Bank of UniMelb has just come to market and provides an easy, self-service banking solution to its clients. Users can open new accounts (with proper identity verification measures), perform banking transactions (such as money transfers and bill payments) with existing accounts, or close their accounts all from the comfort of their own laptop or computer. Branch managers have higher privileges than users, and can communicate and interact with their clients (users assigned to them), see their accounts, and freeze them.
COVID-19 restrictions and the need to work from home have meant Bank of UniMelb wants a rapid migration to this new digital system. Executives have selected you to ensure the system is penetration tested and secure before it is deployed. They love the innovation you have brought to the penetration testing game with your business “We Test Pens Incorporated” and have high expectations of you.
(Note: the web application you are testing will not have these features implemented, but you can assume they exist and are functioning correctly.)
Threat Modelling (20%)
Using STRIDE, threat model the application and identify the possible vulnerabilities (at least two per letter of the acronym). Also, make sure you state who the relevant threat actor is (e.g. state actor, external attacker, bank client, internal employee, etc.). We expect some descriptions around the vulnerabilities, diving into some details, alongside the remediation for them. Should you require knowing the development stack for your remediations, please assume it is LAMP (Linux Apache MySQL PHP).
Required sections of the report:
1. Vulnerabilities / threats
2. Correlating threats to threat actors
3. Remediations
Please use the sample report template provided. There will be marks deducted for anyone who does not use this template.
There is no set word limit for this exercise, but an example has been provided in the template for you to use as a guide. (Please remove this example prior to submission.)
Testing Scenario (40%)
Bank of UniMelb has selected you for this task due to the high reputation of your cyber security degree, and a belief that you will perform with a very high degree of skill. Due to the aforementioned COVID restrictions, the organisation has a limited budget, limited time, and was not able to set up a full testing environment. You will be performing all your testing in a production environment and therefore must use great care and skill, performing only manual penetration testing, while being acutely aware of your behaviour in the organisation\'s environment to prevent potential denial of service attacks (this means no automated scanning).
As you are now a professional, your goal is to present your findings in a high quality report for delivery at the end of this engagement. The quality of your work and the effort that you put in cannot be judged without a quality report detailing all your findings, potential consequences, and recommended remediations. Please see the “Submission format” section for a further explanation on what you must submit for this assignment to be marked.
Lastly, as a tip, you will be testing the full web application specified in the “Scope” section, and are expected to find the following vulnerabilities:
Vulnerability
Flag Format
Marks Weighting
Bypassing client-side authentication
FLAG
5
IDOR via a hidden parameter
FLAG
7.5
Authentication weakness leading to account takeover
FLAG
7.5
Privilege escalation
FLAG
10
Sensitive files / directories left behind during testing / development
FLAG
10
For this assignment some tasks will require automation. We recommend using Burp’s Intruder, but the same thing can be accomplished with Python.
The final vulnerability, Sensitive files / directories left behind during testing / development, will require the use of an automated tool to brute force directories. We will allow DirBuster, which can be cloned from https://gitlab.com/kalilinux/packages/dirbuster. You are free to use external wordlists but you must limit the number of threads to 5.
Please ensure you write up these findings in a suitable format in your report as you find them. Also make sure to add in your own mitigation recommendations! The practicality of the remediation is very important (tailor the recommendations to the application).
Note: There are branch managers created for each student with usernames in the format <username>-branch-manager. You should attempt to compromise these accounts and no others.
BONUS MARKS: If you are able to identify vulnerabilities that have not been listed, please report them for a chance at bonus marks. Bonus marks will be provided at the discretion of the lecturer based on complexity of the finding and quality of the writeup.
Out of Scope
The following vulnerabilities are known to the developer and must not be submitted within the penetration testing report (no marks will be awarded for these findings):
1. Insufficient password policies
2. Sensitive information over HTTP
3. Directory listing enabled
4. Lack of rate limiting on the login page
5. Server-status exposed
Scope
Testing must only be performed on http://assignment-plutus.unimelb.life/
Testing must be manual only. Manual tools may be used (Burp, Zap, etc), however you may not use the automated scanning capabilities of these tools.
No automated scanning or automated tools can be used.
No load testing, denial of service (DOS) or distributed denial of service (DDOS) attacks. You may use Burp’s Intruder, but use less than 30 payloads per minute.
You may also use DirBuster, but you must limit the number of threads to 5.
User Credentials
Use your Melbourne University username as the username and password, for logging into the application.
Report Writing (40%)
For this assignment, we expect a professionally written report, provided to the client (teaching staff), explaining and specifying each vulnerability you identified by discussing the vulnerability, the process of exploitation (steps to reproduce the exploits), the potential impact to the organisation, overall risk, and the remediation (making sure to tailor it to the application). The vulnerabilities must be listed in order of remediation priority, based on the risk posed. We expect an overall assessment of the risk posture for the application, using the findings from your penetration test. Also, please ensure that the flag is displayed in a screenshot at the end of each challenge’s writeup. We will not be accepting any flags that are not displayed in a screenshot.
Please use the sample report template provided. There will be marks deducted for anyone who does not use this template.
`--disable-web-security` 命令似乎不再起作用
【中文标题】`--disable-web-security` 命令似乎不再起作用【英文标题】:The `--disable-web-security` command is seems no longer working 【发布时间】:2011-10-18 14:30:12 【问题描述】:允许在 Chrome 上进行跨域请求的命令 --disable-web-security
不再有效,我想是由于最新更新。
除了下载旧版本的 chrome 并禁用更新之外,还有其他解决方法吗?
不妨问同样的问题,javascript sn-p 建议关闭 Firefox 中的网络安全对我来说永远不起作用:
try
netscape.security.PrivilegeManager.enablePrivilege("UniversalBrowserRead");
catch (e)
alert("UniversalBrowserRead failed");
页面总是提醒UniversalBrowserRead failed
。
【问题讨论】:
哪个版本的 Chrome?我想我已经在 Windows 上使用最新版本运行它并且它可以工作。 我以为我有同样的问题。原来 chrome 仍在系统托盘中运行,并且运行该命令刚刚使用以前的命令行开关创建了一个新窗口。确保首先杀死所有 chrome 实例,否则命令行开关将不起作用。 安装 chromium 或 chrome canary 以在一台机器上安装两种不同的 chrome,一种为开发工作禁用安全性,另一种为日常浏览启用安全性。 【参考方案1】:杀死所有实例并重试。今天遇到了同样的问题,在我杀死 chrome 之后它就可以工作了。
【讨论】:
谢谢!在我关闭所有实例然后运行命令后,它与最新的 Chrome (23.0.1271.97 m) 一起工作。您会知道它有效,因为它说“您正在使用不受支持的命令行标志:--disable-web-security。稳定性和安全性将受到影响。” "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --disable-web-security 谢谢,在我们打开任务管理器并注意到我们有 4 个僵尸 Chrome 进程在后台运行之前,该标志对我们也不起作用。将它们全部杀死并重新启动 Chrome 即可解决此问题。干得好! 是的,Google Hangouts 确实在系统托盘上运行。去任务管理器杀掉所有chrome进程后,现在可以跨域请求了 @CameronTaggart 所以关于“不支持的命令行标志”的警告实际上表明命令行标志正在工作?【参考方案2】:在您的笔记本电脑或计算机中打开任务管理器并尝试杀死系统中所有现有的 chrome* 实例并使用“\Google\Chrome\Application\chrome.exe --disable-web-security”运行快捷方式
当您重新启动笔记本电脑或计算机时它总是会重置,因此您可能需要在重新启动系统时执行此步骤。
【讨论】:
如何启用它(禁用的网络安全)?即使在重新启动 Chrome 并且不重新启动系统后它会重置吗? 如果你想恢复正常的网络安全,你需要关闭 Chrome,然后在没有 --disable-web-security 标志的情况下重新启动它【参考方案3】:使用 --user-data-dir 扩展禁用网络安全命令。这对我有用,更多细节在 >https://bugs.chromium.org/p/chromium/issues/detail?id=575690
我在 windows 中使用的命令:
"C:\Users\Public\Desktop\Google Chrome.lnk" --disable-web-security --user-data-dir
【讨论】:
以上是关于COMP90074 Web Security的主要内容,如果未能解决你的问题,请参考以下文章
不使用 web.xml 时如何将 JDBC 数据源绑定到 JNDI 上下文“java:comp/env/jdbc”
Tomcat + Mysql - 无法找到 java:comp
Spring Security(三十七):Part IV. Web Application Security
org.springframework.security:org.springframework.security.web:jar:3.0.5.RELEASE 的 POM 丢失,没有可用的依赖信息