Skip to content

A demonstration of real-world web exploits including XSS, CSRF, Session Hijacking, and Malicious File Uploads, with analysis and mitigation strategies.

Notifications You must be signed in to change notification settings

smitthbrian/Web-Application-Vulnerabilities-Simulation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

Web Application Vulnerabilities Simulation πŸ•ΈοΈ

This project showcases common web application vulnerabilities and demonstrates how they can be exploited β€” and more importantly, how to fix them. Topics include:

  • βœ… Cross-Site Scripting (XSS)
  • βœ… Cross-Site Request Forgery (CSRF)
  • βœ… Session Hijacking
  • βœ… Malicious File Uploads

πŸ” Attack Scenarios

Realistic demos using vulnerable .aspx pages to simulate:

  • Session stealing via XSS and cookie capture
  • CSRF-based privilege escalation
  • File upload exploits revealing directory structures
  • Session impersonation and lateral movement using iframe injection

πŸ” Defense Strategies

  • Input validation and output encoding
  • MIME-type and file size validation
  • Cookie security with HttpOnly and Secure flags
  • Web Application Firewall (WAF) use
  • Principle of Least Privilege enforcement

πŸ“„ Summary

This project demonstrates how web developer tools, insecure coding practices, and poor file validation can be used by attackers β€” and how organizations can harden their systems with proactive security measures.


πŸ›‘οΈ Created by Brian Smith
πŸ“Ž LinkedIn

About

A demonstration of real-world web exploits including XSS, CSRF, Session Hijacking, and Malicious File Uploads, with analysis and mitigation strategies.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published