ShiloVir Posted November 26, 2008 Share Posted November 26, 2008 http://24.76.126.7/ I know the design isnt great. I made the table layout in like 5 minutes. Im not looking for design critism tho. Im looking for people to attempt to XSS my Login script. Even try going to page source and editing the login, trying to shove SQL injection in there somewhere. Just pls. Dont drop my databases. All IP addr's are logged so if you do notice a bug dont take advantage of it. Some directories you may find of interest are: http://24.76.126.7/images http://24.76.126.7/require http://24.76.126.7/pages as of now for this, I have removed the index.php file from these directories and I even removed the .htaccess file. So have fun guys. ID: SVA Call: 001 Password: Betauser Link to comment Share on other sites More sharing options...
ILMV Posted November 26, 2008 Share Posted November 26, 2008 "You have entered Incorrect User Details" + I copied and pasted from this page Link to comment Share on other sites More sharing options...
ShiloVir Posted November 26, 2008 Author Share Posted November 26, 2008 haha. Found my first problem, Its Case-Sensitive on the password. Ill fix that now. But for this part try using password betauser (No caps) EDIT: Okay, I fixed it. Its no longer case Sensitive, Sorry about that. My Fault Link to comment Share on other sites More sharing options...
darkfreaks Posted November 26, 2008 Share Posted November 26, 2008 PHPSESSID session fixation This script is vulnerable to PHPSESSID session fixation attacks. By injecting a custom PHPSESSID is possible to alter the PHP session cookie. Attackers will normally manipulate cookie values to fraudulently authenticate themselves on a web site. This vulnerability affects /. The impact of this vulnerability By exploiting this vulnerability, an attacker may conduct a session fixation attack. In a session fixation attack, the attacker fixes the user's session ID before the user even logs into the target server, thereby eliminating the need to obtain the user's session ID afterwards. How to fix this vulnerability Set session.use_only_cookies = 1 from php.ini. This option enables administrators to make their users invulnerable to attacks which involve passing session ids in URLs; defaults to 0. Sensitive Directory A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for known sensitive directories like: backup directories, database dumps, administration pages, temporary directories. Each of those directories may help an attacker to learn more about his target. This vulnerability affects /pages. The impact of this vulnerability This directory may expose sensitive information that may help an malicious user to prepare more advanced attacks. How to fix this vulnerability Restrict access to this directory or remove it from the website. Files Uploaded through FTP The description for this alert is contributed by the GHDB community, it may contain inappropriate language. Category : Files containing juicy info Files uploaded through ftp by other people, sometimes you can find all sorts of things from movies to important stuff. This vulnerability affects /icons. Link to comment Share on other sites More sharing options...
ShiloVir Posted November 26, 2008 Author Share Posted November 26, 2008 as for the Session_id: I can fix it. no problem there. In fact I will restrict access from the ini file. Im at school right now so ill do it at a later time. as far as the restricted access to the inependant directories, I do have access set. I simply deleted the index.php files and the htaccess file for purpose of this demo. Link to comment Share on other sites More sharing options...
darkfreaks Posted November 27, 2008 Share Posted November 27, 2008 has anything been fixed ??? Link to comment Share on other sites More sharing options...
ShiloVir Posted November 27, 2008 Author Share Posted November 27, 2008 Just out of curiosity, What program are you using to check the website? Link to comment Share on other sites More sharing options...
Hinty Posted November 27, 2008 Share Posted November 27, 2008 How long does the time ban take Link to comment Share on other sites More sharing options...
darkfreaks Posted November 27, 2008 Share Posted November 27, 2008 Acunetix Link to comment Share on other sites More sharing options...
ShiloVir Posted November 28, 2008 Author Share Posted November 28, 2008 How long does the time ban take haha, It lasts 30 minutes. wow. Thats actually kinda funny you got yourself timebanned. lol Link to comment Share on other sites More sharing options...
Hinty Posted November 28, 2008 Share Posted November 28, 2008 If i was an attacker id be gettin annoyed cus i keep gettin time banned Link to comment Share on other sites More sharing options...
darkfreaks Posted November 28, 2008 Share Posted November 28, 2008 i think thats the point to stop attacks Link to comment Share on other sites More sharing options...
ShiloVir Posted November 29, 2008 Author Share Posted November 29, 2008 If i was an attacker id be gettin annoyed cus i keep gettin time banned Exactly how many times did you get timebanned? Link to comment Share on other sites More sharing options...
darkfreaks Posted November 29, 2008 Share Posted November 29, 2008 enough to be annoyed but hey its only a few hours per attack Link to comment Share on other sites More sharing options...
ShiloVir Posted November 29, 2008 Author Share Posted November 29, 2008 lol, yah Link to comment Share on other sites More sharing options...
ShiloVir Posted November 29, 2008 Author Share Posted November 29, 2008 okay. The beta for my login is over. All teh bugs are fixed... I think.. and so im marking this as solved. Ill get u guys back for the next beta I need tested. Thanks alot.... Darkfreaks. Link to comment Share on other sites More sharing options...
Recommended Posts