eLearnSecurity Professional Penetration Testing Report Prepared By: Raghad Saleh Alkhalefah Prepared For: XXX, LLC. July 10th, 2020 eCPPT Report Sample | Raghad Alkhalefah Table of Contents 1. Executive Summary .......................................................................................................... 3 2. Vulnerability Report .......................................................................................................... 6 Cross Site Scripting (XSS)......................................................................................................... 6 2.1.1 Reflected XSS ................................................................................................................................................................... 6 2.1.2 Stored XSS........................................................................................................................................................................ 6 SQL Injection .............................................................................................................................. 7 2.2.1 Blind SQLi (POST) .......................................................................................................................................................... 7 3. Remediation Report .......................................................................................................... 8 Appendix ................................................................................................................................. 9 References ............................................................................................................................ 10 2|Page eCPPT Report Sample | Raghad Alkhalefah 1. Executive Summary I have been engaged by XXX, LLC to undertake Black Box Penetration Test against the following defined scope: Web Server: x.x.x.x Domain: xxx.com Organization Network: x.x.x.x/23 Corporate Network: x.x.x.x/24 DMZ: x.x.x.x/24 The testing effort took place in DD/MM/YYYY and concluded in DD/MM/YYYY. During this period, the target was analyzed and assessed using a combination of standard tools and utilities. This Black Box assessment was performed to discover and identify any web application, network, and system issues that could pose an information security risk, also to provide solutions to remedy these same issues. This report aims to discuss the results from the assessment, from identifying vulnerabilities to giving remediations. Overall, I achieved the goals of the assessment and identified vulnerabilities in the target web application within the given time frame. This report will include list of findings during the assessment for which the details will be provided in the vulnerability report section. Followed by the remediation report section which identifies some tips to help with prioritizing and assignment of remediation efforts. Phases of penetration testing activities: • Planning – Customer goals are gathered, and rules of engagement obtained. • Reconnaissance – A brief reconnaissance encompassing both active and passive techniques was conducted to determine the breadth and depth of information available about the target network, with particular emphasis on harvesting of potential usernames and information. • Discovery – Perform scanning and enumeration to identify potential vulnerabilities, weak areas, and exploits. • Attack – Confirm potential vulnerabilities through exploitation and perform additional discovery upon new access. • Reporting – Document all found vulnerabilities and exploits, and remediation tips to help the organization overcome these weaknesses. Goals: Primary goal of this penetration test is to validate that the appropriate security measures have been implemented by XXX company at the various layers of the portal to mitigate malicious activity occurring. Secondary Goals includes: To provide assurance to XXX company and their customers, that the web application and other services are adequately protected against unauthorized access to information. To achieve a high standard security posture and to identify all potential risks with the web application and other services. 3|Page eCPPT Report Sample | Raghad Alkhalefah Severity Levels There are number of commonly used schemes for rating vulnerability severity. however, many of them are rigid and do not consider context. While this has value, our own experience has shown that context matters very much in rating the true significance of any security fault. 5 severity levels are used in reporting security faults: CRITICAL HIGH MEDIUM LOW INFORMATIONAL The fault puts the application or system at imminent and substantial risk. These faults require immediate attention. These faults are severe and easily discovered by attackers. They are immediately exploitable without combination with any other fault or may require combination with another fault that has already been observed in the application or system under test. This rating also includes information disclosure where the information itself is confidential or of very high value to an attacker. Faults that could lead to compromise but are not easily discovered, or require significant time or unusual skill to exploit, or are serious but more limited in impact than a CRITICAL fault. These faults are immediately exploitable without combination with any other fault or require combination with another fault that has already been observed in the application or system under test. Faults that, in the opinion of our security engineer could lead to compromise, but are difficult to detect, difficult to exploit, are limited in impact or require combination with at least one other fault to be successfully exploited or social engineering techniques. Faults that could aid in developing other attacks, or faults that if exploited would have limited impact. These faults also include information disclosure that may be helpful to an attacker but is of relatively low perceived value. This severity level is used when our security engineer obtains results that you should know about, but may or may not represent any specific security issue. 4|Page eCPPT Report Sample | Raghad Alkhalefah Vulnerabilities By Impact The following chart discusses the details of what kind of impact, exploited vulnerabilities founded within the target scope: Chart Title 5 4 3 2 1 0 Web Server Network Critical Organization/Corporate Network High Medium Low DMZ Network Informational List of Findings The following list is a summary of items requiring remediation: 1 2 3 4 Description Impact Rating Page Ref Cross Site Scripting (XSS) SQL Injection High High Low Medium 7 11 Recommendations We strongly recommend that XXX, LLC does not disregard the findings encountered in this report. If these vulnerabilities/recommendations are dealt with and fixed, the organization will find that the defense-in-depth posture of the system will improve substantially. We also recommend that in line with good security practice, XXX, LLC conducts periodic re-testing to ensure that neither intentional nor inadvertent changes have compromised their systems, and that new vulnerabilities have not become a threat to them. 5|Page eCPPT Report Sample | Raghad Alkhalefah 2. Vulnerability Report Web Server (x.x.x.x) In performing a detailed web application penetration test against XXX.com, I have identified several issues of concern. In the beginning, I started with network scanning against x.x.x.x and discovered the following open ports: [PICTURE] I then moved to each of them to start testing! 2.1 Cross Site Scripting (XSS) Brief Description References to classification Vulnerability ID Risk Affected Target High Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. OWASP.org CVE-2020-9524 Able to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted and will execute the script. 2.1.1 Reflected XSS xxxxxx Exploitation Proof of Concept [PICTURES WITH DESCRIPTION] 2.1.2 Stored XSS Affected Target xxxxxx Exploitation Proof of Concept [PICTURES WITH DESCRIPTION] 6|Page eCPPT Report Sample | Raghad Alkhalefah 2.2 SQL Injection Brief Description References to classification Vulnerability ID Risk Affected Target High A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands OWASP.org CVE-2020-9521 Able to dumb database content and tables. 2.2.1 Blind SQLi xxxxxx Exploitation Proof of Concept [PICTURES WITH DESCRIPTION] 7|Page eCPPT Report Sample | Raghad Alkhalefah 3. Remediation Report Vulnerability #1 Cross Site Scripting (XSS) • Action Use HTTPOnly cookie flag: Preventing all XSS flaws in an application is hard, as you can see. To help mitigate the impact of an XSS flaw on your site, OWASP also recommends you set the HTTPOnly flag on your session cookie and any custom cookies you have that are not accessed by any JavaScript you wrote. This cookie flag is typically on by default in .NET apps, but in other languages you have to set it manually. … etc Vulnerability #2 SQL Injection • Action Prepared Statements (with Parameterized Queries): Ensure that prepared statements or other mechanism that enables parameter binding is used when accessing the database in a way that would prevent the attackers' supplied data from controlling the structure of the executed query. … etc 8|Page eCPPT Report Sample | Raghad Alkhalefah Appendix Host (IP) Open Ports Services Obtained Access? Vulnerabilities Exploited x.x.x.x X, X xxxxx Yes xxx, xxxx, xxxxx 9|Page eCPPT Report Sample | Raghad Alkhalefah References https://www.kb.cert.org/vuls/id/520827/ https://access.redhat.com/security/cve/cve-2016-5195 https://www.ncua.gov/newsroom/ncua-report/2017/protect-your-systems-against-eternalbluevulnerability https://portswigger.net/web-security/os-command-injection https://cve.mitre.org/ https://cwe.mitre.org/ http://capec.mitre.org/ https://nvd.nist.gov/ https://owasp.org/ 10 | P a g e