CSI4139-Lab 4 Open Web Application Security Project Solved
Each of the challenges in this lab have a flag associated with them. A flag is of the format flag{some_text_here}. The idea comes from the concept of a cyber security CTF in which participants hunt for vulnerabilities revealing flags. These vulnerabilities typically reflect real world security issues.
1
1. Register an account, you may need to use a SQL injection to help you out here. You will find a flag once your SQL injection is successful.
2. Create a link that redirects the user to when they log in. There is no flag for this challenge, just record the URL that you used.
3. Find a stored cross site scripting vulnerability, have an alert pop up on the dashboard page. Once successful a second alert will pop up with the flag.
4. A piece of information is exposed on the employee dashboard. Find this and a flag is with it.
5. Based on the piece of information exposed in question 4 are you able to find a file on the system which shouldn’t be accessible?
6. So in question 5 you’ve found some data that shouldn’t be there. See if you can figure out Fred’s password. This is another form of sensitive data exposure.
7. This one is optional and quite challenging! Find a way to change the admin account’s password, you won’t be able to crack the hash... there might be another way through the messaging system. After all his assistant does automatically read the
messages.
Report For your report be sure to include screen shots of each of the flag you have found. Furthermore write a small description detailing how you were able to find that flag as well as a recommendation for the administrator on what could be done to prevent the vulnerability.