Skip to content

AliceMongodin/NSAPool-PenTest

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

NSAPool-PenTest

PenTest audit

What we found

At first, we can notice that there is more than one page we can access to. At looking at it more closely we can see that we can access it by two ways : HTTPS and HTTP. One of the solution could be to only authorize HTTPS connection for more safety.

Then by pinging the website with the command : ping lab.epidoc.eu We succeeded in getting the IP adress of the website (217.182.188.20). Thanks to this IP, we can now do more things on the website :

  • First of all, retrace it to know more about the location of it.
  • See open ports
  • See other domains linked to this IP

You'll find the picture by looking at "IP1.png" IP1

Then, after seeing that port 22 was open, but also seeing a domain name and hostname (even more : geolocation, name...etc.), we went to see the domain name to see if there are more interesting things :

You'll find results as "DomainName.jpg". DomainName

We can notice that there more than one domaine under the name of baptisteheraud.com with each one differents open ports. We tried to see if some of this ports were also open is the website. We tried first the 8080 port by typing lab.epidoc.eu:8080/ and the server returned us an admin page with some infos on it, such as user names and some nologin.

You'll find these results as Port8080.jpg Port8080

The thing is, beyond the fact that we can access several domains of the owner, is that we can also see a lot of infos about him, like his name, geolocation...etc. And this could be a security problem regarding the privacy of the user. Furthermore if we dig a little bit more with some technos that we can find on GitHub (such as Maigret or Holehe), we can easily access some "confidential" datas like his email, phone number, adress...etc.

Let's talk about the new IP

Because of the crash of the server, the IP changed for : 217.182.188.20 Firts, we checked with nmap to see witch ports were open NmapIP

This time, there were more opened ports, so we went back to [Shodan.io] to try and get more infos

ShodanIP2 ShodanPorts2

At this try, shodan returns us numbers of vulnérabilities, especially some linked to Apache2 and HTTP protocol. Some interested us, like the CVE-2019-0217 and CVE-2021-3449. Those mistakes could be resolved by upgrading Apache to get a more recent version, and those vulerabilites should be fixed Screenshot from 2021-10-30 19-28-12 Screenshot from 2021-10-30 19-27-21

Then we asked ourselves if it was possible to log in as gtp. We typed the command ftp 217.182.188.20 and we logged in as anonymous user and password "root" et we accessed to different files. Solution here, could be to desactive authentication as anonymous user.

Screenshot from 2021-10-30 19-41-12

Furthermor, on admin page, without logging we can find by examining the page, a salted password that is not hashed yes, it should be possible to decode it and use it with full efficencex6LvvMPG7DD4pqNX3bscd3w866mAP442


DISCLAIMER : Our purpose was not to impair the website or to down it. We just looked for some vulnerabilites in order to reinforce its safety after the entreprise asked for it.

cf. pentest.odt for more informations.

About

PenTest during a pool in Epitech

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published