Pen Test Report for DVWA in a Virtual Environment

Authors

  • Mohammed Mujeebuddin Middle East College
  • Samiha Najah Middle East College

Keywords:

vulnerability, hacking, encryption and decryption

Abstract

Business operations are now more digitalized and hence more exposed to technological risks such as hacking exploitation. Penetration testing helps organizations to estimate their security posture through the testing of network, computer systems, or Web applications to identify any existing vulnerabilities that a hacker can exploit. In this article, we aim to demonstrate a practical implementation of Penetration Testing in a virtual environment which was configured for learning purposes. The process involves the following phases: Reconnaissance, Scanning, Enumeration, Vulnerability Assessment, Gaining Access, and recommendation of the countermeasures. The results demonstrated several existing vulnerabilities such as Missing Encryption of Sensitive Data, Improper Certificate Validation and Windows Bluetooth driver elevation of privilege. At the end of the report, several countermeasures have been recommended in order to enhance the security posture of the studied environment.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References or Bibliography

Vaultes. (2020). Why penetration testing is important. https://www.vaultes.com/why-penetration-testing-is-important/#:~:text=The%20main%20reason%20penetration%20tests,security%20policies%20are%20genuinely%20effective.

Tang, A. (2014). A Guide to Penetration Testing. Network Security, 2014(8), 8–11. https://doi.org/10.1016/s1353-4858(14)70079-0

Panda Security. (2022). What is a man-in-the-middle (MITM) attack? definition and prevention. https://www.pandasecurity.com/en/mediacenter/security/man-in-the-middle-attack/

Invicti. (2022). Cookie not marked as secure. https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cookie-not-marked-as-secure/

Invicti. (2022). Insecure Transportation Security Protocol Supported. https://www.invicti.com/eb-vulnerability-scanner/vulnerabilities/insecure-transportation-security-protocol-supported-tls-10/

Alfaro, J. G., & Arribas, G. N. (2009). A Survey on Cross-Site Scripting Attacks. https://doi.org/10.48550/arXiv.0905.4850

Krasniqi, G., & Bejtullahu, V. (2018). Vulnerability assessment and penetration testing: Case study on web application security. 2018 UBT International Conference. https://doi.org/10.33107/ubt-ic.2018.213

Kareem, F. Q., Ameen, S. Y., Salih, A. A., Ahmed, D. M., Kak, S. F., Yasin, H. M., Ibrahim, I. M., Ahmed, A. M., Rashid, Z. N., & Omar, N. (2021). SQL Injection Attacks Prevention System Technology: Review. Asian Journal of Research in Computer Science, 13–32. https://doi.org/10.9734/ajrcos/2021/v10i330242

Invicti. (2022). Internal Server Error. https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/internal-server-error/

Invicti. (2022). Missing X-Frame-Options Header. https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-x-frame-options-header/

Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications, 182(33), 27–29. https://doi.org/10.5120/ijca2018918286

Tal, L. (2019). 84% of all websites are impacted by jQuery XSS Vulnerabilities. Medium. https://lirantal.medium.com/84-of-all-websites-are-impacted-by-jquery-xss-vulnerabilities-snyk-4c73a935ab11

CWE. (2022). CWE-550: Server-generated Error Message Containing Sensitive Information. https://cwe.mitre.org/data/definitions/550.html

Yari, I. A. (2016). Vulnerability Assessment of Web Applications and Recommendations for Actions: Penetration Testing Report. Friedrich-Alexander-University of Erlangen-Nürnberg. https://doi.org/10.13140/RG.2.2.16548.40323

Varshney, G., Misra, M., & Atrey, P. (2017). Browshing a new way of phishing using a malicious browser extension. 2017 Innovations in Power and Advanced Computing Technologies (i-PACT). https://doi.org/10.1109/ipact.2017.8245147

Tanwar, R., Choudhury, T., Zamani, M., & Gupta, S. (2021). Information security and optimization (1st ed.).

Namecheap. (2022). What is ModSecurity and why do we need it?. https://www.namecheap.com/support/knowledgebase/article.aspx/9542/22/what-is-modsecurity-and-why-do-we-need-it/

Sheldon, R. (2022). 12 best patch management software and Tools for 2023. Enterprise Desktop. https://www.techtarget.com/searchenterprisedesktop/tip/12-best-patch-management-software-and-tools

nmap. (2022). Zenmap - Official cross-platform nmap security scanner GUI. Retrieved from https://nmap.org/zenmap/

ManageEngine. (2022).

.

Cyber. (2022). What is vulnerability scoring system and Databases. https://www.xmcyber.com/glossary/what-is-common-vulnerability-scoring-system/

CVE. (2022). Vulnerability details : CVE-2002-1561. https://www.cvedetails.com/cve/CVE-2002-1561/

Mutune, G. (2021). Banner grabbing. https://cyberexperts.com/encyclopedia/banner-grabbing/

GeeksforGeeks. (2022). What is banner grabbing? https://www.geeksforgeeks.org/what-is-banner-grabbing/

Kaspersky. (2022). IP spoofing: How it works and how to prevent it. https://www.kaspersky.com/resource-center/threats/ip-spoofing

Greycampus. (2022). Enumeration and its types. Ethical Hacking. https://www.greycampus.com/opencampus/ethical-hacking/enumeration-and-its-types

Upguard. (2021). What is an enumeration attack? how they work + prevention tips. https://www.upguard.com/blog/what-is-an-enumeration-attack

Imperva. (2019). What is Social Engineering: Attack Techniques & Prevention Methods. https://www.imperva.com/learn/application-security/social-engineering-attack/

Published

05-31-2023

How to Cite

Mujeebuddin, M. ., & Najah, S. (2023). Pen Test Report for DVWA in a Virtual Environment. Journal of Student Research. Retrieved from https://www.jsr.org/index.php/path/article/view/2309