SlideShare a Scribd company logo
1 of 46
Download to read offline
Do I need…to fix that stupid
vulnerabilities?
By i3umi3iei3ii
" This slide is purely intended for educational and research purposes only. We do NOT want anyone to use
any information from this slide to attack or do illegal thing (refer to the laws in your country). So that, any
actions and or activities related to the materials from this repository is solely your responsibility. If you
don’t agree, you are not allowed to access this slide, close this immediately “
2
Disclaimer
Disclaimer
Things I would like to share with you today
3
overview
o Server version disclosure
o Bypass Authentication
o Session in /tmp/sess_xxx
o User Enumeration
The software we are going to deal with
4
https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE
overview
Burp Suite
5
overview
Client Server
HTTP Request
HTTP Response
Server Version
Disclosure
Server Version Disclosure
7
ServerVersionDisclosure
8
ServerVersionDisclosure
9
ServerVersionDisclosure
User Enumeration
User Enumeration
11
UserEnumeration
Valid Username
Invalid Username
Login with an invalid username and invalid password
12
UserEnumeration
Login with a valid username and invalid password
13
UserEnumeration
Brute-Forcing
14
UserEnumeration
15
UserEnumeration
Non-existing User
Existing User
User Enumeration
16
UserEnumeration
// Log in with an invalid password
If( res.msg == “Wrong password” ){
console.log(“User dose exist”);
} else {
console.log(“User dose not exist”);
}
Login with a valid username and invalid password
17
UserEnumeration
Login with an invalid username and invalid password
18
UserEnumeration
19
UserEnumeration
Non-existing User
Existing User
User Enumeration
20
UserEnumeration
// Log in with an invalid password
If( res.time > 80ms ){
console.log(“User dose exist”);
} else {
console.log(“User dose not exist”);
}
Authentication
Bypass
Authentication Bypass
22
AuthenticationBypass
Authentication Bypass
23
AuthenticationBypass
Authentication Bypass
24
user1||/user1/theme/original
user2||/user2/theme/original
(Base64)
dXNlcjJ8fC91c2VyMi90aGVtZS9vcmlnaW5hbA==
AuthenticationBypass
Authentication Bypass
26
If( res. result == 1 ){
console.log(“login”);
redirect([‘Profile’]);
} else {
console.log(“User dose not exist”);
redirect([‘login’]);
}
AuthenticationBypass
If( valid(username) && valid(pass)){
res.send({ result: 1 });
} else {
res.send({ result: 0 });
}
Back-end Front-end
Authentication Bypass
27
If we know that the user dose exist,
We can gain access to the account by
“Modify response”
AuthenticationBypass
Authentication Bypass
28
AuthenticationBypass
29
Hash vs Encode vs Encrypt
AuthenticationBypass
Hashing
30
AuthenticationBypass
Input Data
Hashing
Algorithm
Output Data
(Fixed Length)
BKK.JS MD5
2f342e019e40c69734f0e
80b45ef026c
BKK.JS SHA1
c2f45b82a11359de5861
a47dbda32ccb343d656c
Encoding (Encode/Decode)
31
AuthenticationBypass
Encryption (Encrypt/Decrypt)
32
AuthenticationBypass
o Symmetric Key
o Asymmetric Key
Shared Key Shared Key
Public Key Private KeyCipher TextMessage Message
Encrypt
Cipher TextMessage Message
Decrypt
Session files are stored in
insecure directory
Session in “/tmp” directory
34
Sessionfile/tmo/sess_xxx
Token in URL
35
Sessionfile/tmo/sess_xxx
Any Problem?!?!?!?
It is not a random value
36
Since the ‘rkey’ value is not random, there might be some factor that use to
generate the value, what is it?
o IP Address?
o MAC Address?
Sessionfile/tmo/sess_xxx
Set client ip address
37
Sessionfile/tmo/sess_xxx
Login as root on a testing server
38
Sessionfile/tmo/sess_xxx
Extract session value
39
Sessionfile/tmo/sess_xxx
Information we generate from testing server
40
cwpsrv-bad194011f5ad0cf609c77ad222e50d6 = 3hkhskb2coovn9bpkpuqivst42
/tmp/sess_3hkhskb2coovn9bpkpuqivst42
username|s:4:"root";logged|b:1;rkey|s:16:"w4wlTtbmZvQY8UA8";token|s:36:"cwp_
a5711eb95256129d3304915661c6452e";
Sessionfile/tmo/sess_xxx
Login and upload session file to /tmp
41
Sessionfile/tmo/sess_xxx
Set up attacker’s browser
42
Sessionfile/tmo/sess_xxx
Become root user
43
Sessionfile/tmo/sess_xxx
Vulnerabilities Chaining
44
o Server version disclosure o User Enumeration
o Bypass Authentication o Session in /tmp/sess_xxx
Require: Server signature Require: Target URL
Result: Target URL Result: Target Username
Require: Target Username
Result: Authenticated User
Require: Authenticates User
Result: High Privilege User (root)
VulnerabilitiesChaining
Conclusion
45
Conclusion
o Server version disclosure : least server information disclose
o Bypass Authentication : Do not trust your client
o Session in /tmp/sess_xxx : Directory and File permission
o User Enumeration : Keep the response message the same
o Hash != Encode != Encrypt
o Do not send sensitive data through the URL
THANK YOU
Photo by Unsplash

More Related Content

Similar to Bkk.js #9 Do i need to fix that stupid vulnerabilities

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
Reversing & malware analysis training part 11 exploit development advanced
Reversing & malware analysis training part 11   exploit development advancedReversing & malware analysis training part 11   exploit development advanced
Reversing & malware analysis training part 11 exploit development advanced
Abdulrahman Bassam
 
ETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a HackerETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a Hacker
Rob Gillen
 
WHS-hackability-Index-083013
WHS-hackability-Index-083013WHS-hackability-Index-083013
WHS-hackability-Index-083013
Janis Weiss
 
Security In .Net Framework
Security In .Net FrameworkSecurity In .Net Framework
Security In .Net Framework
Ramakanta Behera
 

Similar to Bkk.js #9 Do i need to fix that stupid vulnerabilities (20)

Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Understanding Windows Lateral Movements
Understanding Windows Lateral MovementsUnderstanding Windows Lateral Movements
Understanding Windows Lateral Movements
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensics
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
Chapter 4 access control fundamental ii
Chapter 4   access control fundamental iiChapter 4   access control fundamental ii
Chapter 4 access control fundamental ii
 
Dynamic Database Credentials: Security Contingency Planning
Dynamic Database Credentials: Security Contingency PlanningDynamic Database Credentials: Security Contingency Planning
Dynamic Database Credentials: Security Contingency Planning
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensics
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
 
How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Reversing & malware analysis training part 11 exploit development advanced
Reversing & malware analysis training part 11   exploit development advancedReversing & malware analysis training part 11   exploit development advanced
Reversing & malware analysis training part 11 exploit development advanced
 
ETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a HackerETCSS: Into the Mind of a Hacker
ETCSS: Into the Mind of a Hacker
 
WHS-hackability-Index-083013
WHS-hackability-Index-083013WHS-hackability-Index-083013
WHS-hackability-Index-083013
 
На страже ваших денег и данных
На страже ваших денег и данныхНа страже ваших денег и данных
На страже ваших денег и данных
 
Security In .Net Framework
Security In .Net FrameworkSecurity In .Net Framework
Security In .Net Framework
 
DEFCON 23 - Jason Haddix - how do i shot web
DEFCON 23 - Jason Haddix - how do i shot webDEFCON 23 - Jason Haddix - how do i shot web
DEFCON 23 - Jason Haddix - how do i shot web
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Bkk.js #9 Do i need to fix that stupid vulnerabilities