Intern Assessment Isac 2
Intern Assessment Isac 2
Task 1:
Step 1: Setup DVWA on Docker To begin the assessment process, you need to set up DVWA (Damn
Vulnerable Web Application) on Docker. Follow the steps below:
Description: This challenge involves a web form that accepts user input and executes a system command
without proper sanitization. The goal is to execute arbitrary commands and retrieve sensitive information.
Steps Taken:
1. Opened the DVWA application and navigated to the "Command Injection" challenge.
2. Inspected the web form and identified the input field vulnerable to command injection.
3. Started by entering simple commands, such as ls, to see if the system executes them.
4. Notice that the input is directly concatenated into a command without any validation or sanitization.
5. Exploited the vulnerability by injecting ;ls as the input, which executes the command and lists the
contents of the current directory.
6. Gradually escalated the attack by injecting more complex commands, such as ;cat /etc/passwd to
retrieve the contents of the password file.
7. Took a screenshot of each step to provide visual evidence of successful command execution.
8. Provided a detailed explanation of the vulnerability and the steps taken to exploit it in the write-up
document.
Command Injection < LOW >
Command Injection < MEDIUM >
Command Injection < HIGH >
Challenge 2: SQL Injection
Description: In this challenge, the DVWA application is vulnerable to SQL injection attacks. The objective is to manipulate the SQL query to
retrieve unauthorised data or perform unintended actions.
Steps Taken:
Steps Taken:
To complete Task 2, you need to set up Mutillidae on Docker. Follow the steps below:
In this step, you are required to solve specific labs in Mutillidae with Hints
enabled. The labs you need to solve are Lab 1, 6, 10, 12, 13, 14, 17, and 18.
Follow the instructions below to solve each lab and provide the necessary
documentation.
Lab 1 - Cross-Site Scripting (XSS):
1. Open your web browser and enter the URL to access Mutillidae.
2. Log in to Mutillidae using the provided credentials.
3. Once logged in, locate the lab titled "Lab 1 - Cross-Site Scripting (XSS)."
4. Read the lab description and hints carefully to understand the objective.
5. Follow the hints and instructions to identify and exploit the XSS vulnerability.
6. While solving the lab, use screen capture software to record your actions and
demonstrate the solution step-by-step. Ensure that the recording is clear and
easily understandable.
7. Capture screenshots at significant points during the lab, such as identifying the
vulnerability, injecting the XSS payload, and showcasing the successful
exploitation.
Lab 1 - Cross-Site Scripting (XSS):
Lab 6 - SQL Injection UNION Attack:
1. Log in to Mutillidae and navigate to the lab labeled "Lab 6 - SQL Injection UNION
Attack."
2. Read the lab instructions and hints to comprehend the task at hand.
3. Use the provided hints to craft a SQL injection UNION attack to retrieve
information from the database.
4. Record your screen while solving the lab, capturing your actions and explaining
the steps you take.
5. Take screenshots during critical stages, including constructing the payload,
executing the injection, and obtaining the desired information.
Lab 6 - SQL Injection UNION Attack:
Lab 17 - Unvalidated Parameters:
1. Access Mutillidae and find the lab titled "Lab 17 - Unvalidated Parameters."
2. Read the lab description and hints to grasp the lab's objectives.
3. Follow the hints and instructions to identify and exploit the unvalidated
parameter vulnerability.
4. Record your screen during the lab, capturing your actions and providing
explanations when necessary.
5. Capture screenshots at significant points, such as identifying the vulnerable
parameter, injecting malicious input, and observing the impact.
Lab 17 - Unvalidated Parameters:
Lab 18 - Authentication Bypass:
1. Log in to Mutillidae and locate the lab titled "Lab 18 - Authentication Bypass."
2. Read the lab instructions and hints to understand the authentication bypass
scenario.
3. Utilize the provided hints to bypass the authentication mechanism and gain
unauthorized access.
4. Record your screen while solving the lab, clearly demonstrating the steps you
take to bypass authentication.
5. Take screenshots at important stages, such as identifying the authentication
vulnerability, manipulating request parameters, and accessing restricted
resources.
Lab 18 - Authentication Bypass:
Lab 13 - Unvalidated Redirects and Forwards:
1. Access Mutillidae and find the lab labeled "Lab 13 - Unvalidated Redirects and
Forwards."
2. Carefully read the lab description and hints to understand the lab's objectives.
3. Utilize the hints to identify and exploit the unvalidated redirect vulnerability.
4. Record your screen as you progress through the lab, clearly showing the
steps you take to accomplish the task.
5. Capture screenshots of crucial stages, such as identifying the vulnerable
redirect, manipulating the URL, and observing the redirection behavior.
Lab 13 - Unvalidated Redirects and Forwards:
Lab 14 - Buffer Overflow:
1. Log in to Mutillidae and navigate to the lab named "Lab 14 - Buffer Overflow."
2. Read the lab instructions and hints to understand the buffer overflow
scenario.
3. Utilize the provided hints to craft a buffer overflow exploit and gain control of
the vulnerable program.
4. Record your screen while solving the lab, demonstrating the necessary steps
and explaining the techniques employed.
5. Take screenshots at important stages, such as identifying the buffer overflow
vulnerability, constructing the exploit payload, and achieving code execution.
Lab 14 - Buffer Overflow:
CONCLUSION