Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Ethical Hacking

(Server Vulnerabilities and XSS Attacks)

LIS4774 - For The Lulz


By: Trevor Sears, Scott Ordonez, Ankur Patel, Nick Kashner,
Carson Marple, Shane Thompson
Computing environment

LAMP Server - Linux, Apache, mySQL, PHP.


PROS - free and open source, expansive materials, widespread
use.
CONS - security Issues, expansive attack kits, not ideal for
enterprise, no dedicated service.
Vulnerabilities Part A
Explain the vulnerabilities found in part A
Access Control flaws(DEMO)
Super-User enabled in Apache server
PHP Session Hijacking
Remedies/recommendations Part A
Implemented Remedies

Intrusion Detection System

OSSEC, host-based IDS

Does not prevent intrusion, only detects

Set to automatically alert administrator of any intrusions

Access Control protocol

Proper permission configuration


Future Remedies/recommendations Part A cont.
Clean PHP code

Sanitize user input

Regular expressions

Exit statements

Change way input is done

Radio button, dropdown list

Snort, network-based IDS


XSS and Vulnerabilities
XSS (short for Cross-Site Scripting) malicious script injected into
website or application (OWASP, 2016).
HTML Code

-Some sites allow for HTML input, attacker can post with link to server
controlled by attacker.

Scripts

--Executed on sites controlled by attacker, usually written to steal cookies

Cookies

-Contain session information, allows attacker to hijack session until cookie


Recommendations Part B
-Set <domain> attribute

-HTTP only cookies

HTML Sanitation

-removes tags that may be exploited such as, <script>, <iframe>, and <link>

BEEP Browsers

-contain protocols that prevent execution of malicious scripts

-Noxes, script-blocking, acts as a web proxy, background service, builds upon


personal firewall
Conclusion / Questions
Servers are essential

Servers hold sensitive data

Servers must be protected

Servers ARE vulnerable to hacks by: malicious code, cookie


attacks, PHP session hijacking.

Servers CAN be protected in ways like: IPS & IDS, firewalls,


limiting user input.

You might also like