Jump to content

[SOLVED] Test the Login Pls?


ShiloVir

Recommended Posts

http://24.76.126.7/

 

I know the design isnt great. I made the table layout in like 5 minutes. Im not looking for design critism tho. Im looking for people to attempt to XSS my Login script. Even try going to page source and editing the login, trying to shove SQL injection in there somewhere. Just pls. Dont drop my databases. All IP addr's are logged so if you do notice a bug dont take advantage of it. Some directories you may find of interest are:

 

http://24.76.126.7/images

http://24.76.126.7/require

http://24.76.126.7/pages

 

as of now for this, I have removed the index.php file from these directories and I even removed the .htaccess file. So have fun guys.

 

ID: SVA

Call: 001

Password: Betauser

Link to comment
Share on other sites

haha. Found my first problem, Its Case-Sensitive on the password. Ill fix that now. But for this part try using password

 

betauser

 

(No caps)

 

EDIT: Okay, I fixed it. Its no longer case Sensitive, Sorry about that. My Fault :P

Link to comment
Share on other sites

PHPSESSID session fixation

This script is vulnerable to PHPSESSID session fixation attacks.

 

By injecting a custom PHPSESSID is possible to alter the PHP session cookie. Attackers will normally manipulate cookie values to fraudulently authenticate themselves on a web site.

This vulnerability affects /.

The impact of this vulnerability

By exploiting this vulnerability, an attacker may conduct a session fixation attack. In a session fixation attack, the attacker fixes the user's session ID before the user even logs into the target server, thereby eliminating the need to obtain the user's session ID afterwards.

 

How to fix this vulnerability

Set session.use_only_cookies = 1 from php.ini. This option enables administrators to make their users invulnerable to attacks which involve passing session ids in URLs; defaults to 0.

Sensitive Directory

A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for known sensitive directories like: backup directories, database dumps, administration pages, temporary directories. Each of those directories may help an attacker to learn more about his target.

This vulnerability affects /pages.

The impact of this vulnerability

This directory may expose sensitive information that may help an malicious user to prepare more advanced attacks.

 

How to fix this vulnerability

Restrict access to this directory or remove it from the website.

 

Files Uploaded through FTP

The description for this alert is contributed by the GHDB community, it may contain inappropriate language.

 

Category : Files containing juicy info

 

Files uploaded through ftp by other people, sometimes you can find all sorts of things from movies to important stuff.

This vulnerability affects /icons.

Link to comment
Share on other sites

as for the Session_id:

I can fix it. no problem there. In fact I will restrict access from the ini file. Im at school right now so ill do it at a later time.

 

as far as the restricted access to the inependant directories, I do have access set. I simply deleted the index.php files and the htaccess file for purpose of this demo.

Link to comment
Share on other sites

okay. The beta for my login is over. All teh bugs are fixed... I think.. :P

 

and so im marking this as solved. Ill get u guys back for the next beta I need tested.

 

Thanks alot.... Darkfreaks.

Link to comment
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.