Task 2
Task 2
Summary
:
SQL INJECTION SQL injection is a code injection technique that might destroy your database, common
web hacking technique and placement of malicious code in SQL statements, via web page input.
LOGIN URL:http://15.207.221.18:1002/dow88u170t/app/index.php
STEPS:
.
1.URL http://15.207.221.18:1002/dow88u170t/app/index.php
2.PAYLOAD : html code
<html>
<head>
<title></title>
</head>
<body>
<center> <h1>hide</h1>
<h2>the</h2>
<h3>clickjaking</h3>
<iframe src="http://15.207.221.18:1002/dow88u170t/app/index.php" width="500"
height="700" style=" opacity: 1;">
</iframe>
</center>
</body>
</html>
3.STEPS TO REPRODUCE:
(I) . Open the above HTML file with target url in browser.
(I) .Then see the above screen shot the target website embeded into the above html
page .So,this leads to clickjacking vulnerability.
3. XSS VULNERABILITY:
Summary: Cross-site Scripting (XSS) is a security vulnerability usually found in websites
and/or web applications that accept user input.
Steps to reproduce :
1. Open default account in the above url . That will shoe below.
2. Enter the <script>alert(123)</script> this payload in the Add document field that will shown
below.
4. HTML INJECTION.
Summary:
HTML Injection also known as Cross Site Scripting. It is a security vulnerability that allows an
attacker to inject HTML code into web pages that are viewed by other users.
Attackers often inject malicious JavaScript, VBScript, ActiveX, and/or HTML into vulnerable
applications to deceive the user in order to gather data from them. Cross-site scripting (XSS)
vulnerabilities can be used by attackers to bypass authentication controls there by gaining
access to sensitive data on your system. Well crafted malicious code can even help the
attacker gain access to the entire system.HTML Injection also known as Cross Site Scripting. It
is a security vulnerability that allows an attacker to inject HTML code into web pages that are
viewed by other users.
Steps to reproduce :
1. First Login to your account then go to the add account field that will shown below
2. Now enter the <h1>hello</h1> this payload in the add account field
3. Now click on add account and successfully inject the html code .that
will shown below
IMPACT:It can allow an attacker to modify the page. To steal another person's
identity.
Summary:
A local file upload vulnerability is a vulnerability where an application allows a user to upload a
malicious file directly which is then executed.
Steps to reproduce :”
1. Go to your account then click on the “upload checks” then you see the below image .
2. Actually in the field we upload only images but here it takes any type file here I am upload .php
file that will sucessfully uploaded that will shown below
3. Then you see that you didn’t get any error related file upload .
Siva Gandeti
+917729023860