CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Solve Labs that are created for the following vulnerabilities: 1. Login Bypass 2. Admin Credentials Access (SQLi) 3. CSRF 4. XSS CNP-MAR2024-CSEH-1 BY-JATIN SAINI
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. RESEARCH • Name- PortSwigger: Web Application Security, Testing, & Scanning • URL - https://portswigger.net/ • CATEGORY- Web Application Security, Testing, & Scanning • TECHNOLOGY USED – Analytics-Piwik PRO core|Web server- Kestrel| • Security- HSTS|Javascript Libraries- LazySizes|Web Freamworks- Microsoft ASP.NET| Performance- LazySizes| Miscellaneous- open Graph.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMPACT ANALYSIS • LOGIN BYPASS • 1. Unauthorized access Impact: Attackers can access sensitive systems and data without adequate authentication. consequences: Disclose confidential information (e.g., personal information, financial records). potential data breaches and loss of intellectual property. • 2. Data Integrity and Manipulation • Impact: Unauthorized users may alter or delete critical data. • Consequences: • Corruption of databases and loss of data integrity. • Inaccurate information leading to poor decision-making. • Potential legal implications if regulatory compliance is breached. • 3. Reputational Damage • Impact: The organization’s reputation may suffer. • Consequences: • Loss of customer trust and loyalty. • Negative media coverage. • Long-term damage to brand reputation and market position.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. LOGIN BYPASS MITIGATION •Regular Security Audits: Conduct frequent security audits to identify and remediate vulnerabilities. •Multi-Factor Authentication (MFA): Implement MFA to add an extra layer of security. •User Access Management: Enforce strict access controls and regularly review user permissions. •Incident Response Plan: Develop and maintain an incident response plan to quickly address and mitigate security breaches. •Security Awareness Training: Educate employees on security best practices and phishing prevention. •Regular Software Updates: Ensure all systems and applications are regularly updated to patch known vulnerabilities.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMPACT ANALYSIS-ADMIN CREDENTIALS ACCESS SQLi 3 • 1. Unauthorized employment • Impact: Attackers can gain business privileges on the affected system or application. • consequences: • Full control: Attackers can manipulate the entire database, including creating, modifying, or deleting data and user accounts. • Access to sensitive information: Performance credentials often provide access to highly sensitive and valuable information within an organization. • Potential for further exploits: Admin access enables attackers to escalate their attacks by causing extensive damage to other systems. • 2. Data Breach and Confidentiality Agreement • Impact: Disclosure of sensitive private information. • consequences: • Disclosure of Personal Financial Information: Disclosure of personal information, financial records, trade secrets, and other confidential information. • Non-compliance: Breach of GDPR, HIPAA, and other data protection laws, with legal ramifications. • Identity theft and fraud: Stolen information can be used for identity theft, financial fraud, and other malicious activities. • 3. Provision in existence of system integrity • Impact: Abuse or disruption of system functionality. • consequences: • Data Integrity Issues: Attackers can alter or delete sensitive data, resulting in data corruption and loss of confidence in data integrity. • Service Interruption: Critical systems and services may be disrupted or taken offline, affecting business operations and customer services. • Malware exploitation: Attackers can professionally exploit malware or ransomware, causing severe system security compromises and significant performance disruption.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. MITIGATION-ADMIN CREDENTIALS ACCESS SQLi 3 •Input Validation and Sanitization: Ensure all user inputs are properly validated and sanitized to prevent SQL injection. •Parameterized Queries: Use parameterized queries or prepared statements to interact with the database, avoiding direct SQL command execution with user input •. •Least Privilege Principle: Limit the database permissions and access rights for application accounts, ensuring they only have the minimum necessary privileges. •Regular Security Audits and Penetration Testing: Conduct regular security audits and penetration testing to identify and remediate vulnerabilities. •Web Application Firewalls (WAFs): Implement WAFs to detect and block SQL injection attacks in real-time. •Security Patches and Updates: Regularly update and patch all systems, applications, and databases to address known vulnerabilities. •Security Awareness Training: Educate developers and IT staff on secure coding practices and the importance of protecting against SQL injection attacks.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMPACT ANALYSIS- CSRF • 1. Unauthorized Actions • Impact: Attackers can execute actions on behalf of authenticated users without their consent. • Consequences: • Unintended transactions (e.g., fund transfers, purchase orders). • Changes to user settings (e.g., email address, password). • 2. Data Integrity and Confidentiality • Impact: Sensitive data may be exposed or altered. • Consequences: • Modification or deletion of important records. • Exposure of confidential information (e.g., personal details, financial data). • 3. Financial Loss • Impact: Direct and indirect financial losses for both users and organizations. • Consequences: • Unauthorized financial transactions leading to monetary loss. • Costs associated with incident response and remediation. • Potential legal liabilities and compensation claims. • 6. Compromise of User Accounts • Impact: Attackers can gain control over user accounts. • Consequences: • Hijacking of user accounts for malicious activities. • Use of compromised accounts to spread further attacks (e.g., spam, phishing).
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. MITIGATIONS- CSRF •Anti-CSRF Tokens: Implement anti-CSRF tokens in forms and state-changing requests to ensure the validity of requests. •SameSite Cookie Attribute: Use the SameSite attribute in cookies to restrict cross-site requests. •User Interaction Verification: Require additional verification (e.g., re-entering the password, CAPTCHA) for sensitive actions. •Referer Header Validation: Check the Referer header to ensure that the request is coming from the expected origin. •Security Awareness Training: Educate users about the risks of CSRF and safe browsing practices. •Regular Security Audits: Conduct regular security audits and penetration testing to identify and address vulnerabilities. •Framework Security Features: Use built-in security features provided by web frameworks to defend against CSRF attacks.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMAPCT ANALYSIS- XSS (CROSS SITE SCRIPTING) • 1. Data Theft • Impact: Attackers can steal sensitive information such as cookies, session tokens, and other critical data from the victim's browser. • Consequences: • Unauthorized access to user accounts. • Exposure of personal and financial information. • Identity theft and fraud. • 2. Session Hijacking • Impact: Attackers can hijack user sessions to gain unauthorized access to the application. • Consequences: • Attacker impersonates the victim, performing actions on their behalf. • Potential for further exploitation within the application. • 3. Defacement • Impact: Malicious scripts can alter the content displayed to users. • Consequences: • Defacement of web pages leading to a damaged reputation. • Misleading information being displayed to users
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. MITIGATIONS- XSS •Input Validation: Ensure all input is validated and sanitized to prevent injection of malicious scripts. •Output Encoding: Encode output to ensure that any data that is rendered in the browser is treated as data, not executable code. •Content Security Policy (CSP): Implement CSP to restrict the execution of unauthorized scripts. •Security Testing: Regularly conduct security assessments, including penetration testing and code reviews. •User Education: Educate users on the risks of XSS and safe browsing practices. •Use Security Libraries and Frameworks: Leverage security features provided by modern web frameworks and libraries to mitigate XSS risks.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. SCREEN SHOT LOGIN BYPASS
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. SCREEN SHOT ADMIN CREDENTIALS ACCESS SQLi
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. SCREEN SHOT CSRF
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. XSS CROSS SITE SCRIPTING SCREEN SHOT (STORED )
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. DOM XSS SCREEN SHOT
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. TOOLS USED IN PROJECT • TOOLS – BURPSUITE , WAPPALYZER , • PLATFORM USED- PORTSWIGGER • PASSIVE RECONNISSANCE – WHO.IS , EDGUR CODE USED - "><svg onload=alert(1)>for DOM XSS DOCUMENT.WRITE <><img src=1 onerror=alert(1)> FOR STORED DOM XSS
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!

Securing Solve Labs: Addressing Key Vulnerabilities through Practical Labs

  • 1.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Solve Labs that are created for the following vulnerabilities: 1. Login Bypass 2. Admin Credentials Access (SQLi) 3. CSRF 4. XSS CNP-MAR2024-CSEH-1 BY-JATIN SAINI
  • 2.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. RESEARCH • Name- PortSwigger: Web Application Security, Testing, & Scanning • URL - https://portswigger.net/ • CATEGORY- Web Application Security, Testing, & Scanning • TECHNOLOGY USED – Analytics-Piwik PRO core|Web server- Kestrel| • Security- HSTS|Javascript Libraries- LazySizes|Web Freamworks- Microsoft ASP.NET| Performance- LazySizes| Miscellaneous- open Graph.
  • 3.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMPACT ANALYSIS • LOGIN BYPASS • 1. Unauthorized access Impact: Attackers can access sensitive systems and data without adequate authentication. consequences: Disclose confidential information (e.g., personal information, financial records). potential data breaches and loss of intellectual property. • 2. Data Integrity and Manipulation • Impact: Unauthorized users may alter or delete critical data. • Consequences: • Corruption of databases and loss of data integrity. • Inaccurate information leading to poor decision-making. • Potential legal implications if regulatory compliance is breached. • 3. Reputational Damage • Impact: The organization’s reputation may suffer. • Consequences: • Loss of customer trust and loyalty. • Negative media coverage. • Long-term damage to brand reputation and market position.
  • 4.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. LOGIN BYPASS MITIGATION •Regular Security Audits: Conduct frequent security audits to identify and remediate vulnerabilities. •Multi-Factor Authentication (MFA): Implement MFA to add an extra layer of security. •User Access Management: Enforce strict access controls and regularly review user permissions. •Incident Response Plan: Develop and maintain an incident response plan to quickly address and mitigate security breaches. •Security Awareness Training: Educate employees on security best practices and phishing prevention. •Regular Software Updates: Ensure all systems and applications are regularly updated to patch known vulnerabilities.
  • 5.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMPACT ANALYSIS-ADMIN CREDENTIALS ACCESS SQLi 3 • 1. Unauthorized employment • Impact: Attackers can gain business privileges on the affected system or application. • consequences: • Full control: Attackers can manipulate the entire database, including creating, modifying, or deleting data and user accounts. • Access to sensitive information: Performance credentials often provide access to highly sensitive and valuable information within an organization. • Potential for further exploits: Admin access enables attackers to escalate their attacks by causing extensive damage to other systems. • 2. Data Breach and Confidentiality Agreement • Impact: Disclosure of sensitive private information. • consequences: • Disclosure of Personal Financial Information: Disclosure of personal information, financial records, trade secrets, and other confidential information. • Non-compliance: Breach of GDPR, HIPAA, and other data protection laws, with legal ramifications. • Identity theft and fraud: Stolen information can be used for identity theft, financial fraud, and other malicious activities. • 3. Provision in existence of system integrity • Impact: Abuse or disruption of system functionality. • consequences: • Data Integrity Issues: Attackers can alter or delete sensitive data, resulting in data corruption and loss of confidence in data integrity. • Service Interruption: Critical systems and services may be disrupted or taken offline, affecting business operations and customer services. • Malware exploitation: Attackers can professionally exploit malware or ransomware, causing severe system security compromises and significant performance disruption.
  • 6.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. MITIGATION-ADMIN CREDENTIALS ACCESS SQLi 3 •Input Validation and Sanitization: Ensure all user inputs are properly validated and sanitized to prevent SQL injection. •Parameterized Queries: Use parameterized queries or prepared statements to interact with the database, avoiding direct SQL command execution with user input •. •Least Privilege Principle: Limit the database permissions and access rights for application accounts, ensuring they only have the minimum necessary privileges. •Regular Security Audits and Penetration Testing: Conduct regular security audits and penetration testing to identify and remediate vulnerabilities. •Web Application Firewalls (WAFs): Implement WAFs to detect and block SQL injection attacks in real-time. •Security Patches and Updates: Regularly update and patch all systems, applications, and databases to address known vulnerabilities. •Security Awareness Training: Educate developers and IT staff on secure coding practices and the importance of protecting against SQL injection attacks.
  • 7.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMPACT ANALYSIS- CSRF • 1. Unauthorized Actions • Impact: Attackers can execute actions on behalf of authenticated users without their consent. • Consequences: • Unintended transactions (e.g., fund transfers, purchase orders). • Changes to user settings (e.g., email address, password). • 2. Data Integrity and Confidentiality • Impact: Sensitive data may be exposed or altered. • Consequences: • Modification or deletion of important records. • Exposure of confidential information (e.g., personal details, financial data). • 3. Financial Loss • Impact: Direct and indirect financial losses for both users and organizations. • Consequences: • Unauthorized financial transactions leading to monetary loss. • Costs associated with incident response and remediation. • Potential legal liabilities and compensation claims. • 6. Compromise of User Accounts • Impact: Attackers can gain control over user accounts. • Consequences: • Hijacking of user accounts for malicious activities. • Use of compromised accounts to spread further attacks (e.g., spam, phishing).
  • 8.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. MITIGATIONS- CSRF •Anti-CSRF Tokens: Implement anti-CSRF tokens in forms and state-changing requests to ensure the validity of requests. •SameSite Cookie Attribute: Use the SameSite attribute in cookies to restrict cross-site requests. •User Interaction Verification: Require additional verification (e.g., re-entering the password, CAPTCHA) for sensitive actions. •Referer Header Validation: Check the Referer header to ensure that the request is coming from the expected origin. •Security Awareness Training: Educate users about the risks of CSRF and safe browsing practices. •Regular Security Audits: Conduct regular security audits and penetration testing to identify and address vulnerabilities. •Framework Security Features: Use built-in security features provided by web frameworks to defend against CSRF attacks.
  • 9.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. IMAPCT ANALYSIS- XSS (CROSS SITE SCRIPTING) • 1. Data Theft • Impact: Attackers can steal sensitive information such as cookies, session tokens, and other critical data from the victim's browser. • Consequences: • Unauthorized access to user accounts. • Exposure of personal and financial information. • Identity theft and fraud. • 2. Session Hijacking • Impact: Attackers can hijack user sessions to gain unauthorized access to the application. • Consequences: • Attacker impersonates the victim, performing actions on their behalf. • Potential for further exploitation within the application. • 3. Defacement • Impact: Malicious scripts can alter the content displayed to users. • Consequences: • Defacement of web pages leading to a damaged reputation. • Misleading information being displayed to users
  • 10.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. MITIGATIONS- XSS •Input Validation: Ensure all input is validated and sanitized to prevent injection of malicious scripts. •Output Encoding: Encode output to ensure that any data that is rendered in the browser is treated as data, not executable code. •Content Security Policy (CSP): Implement CSP to restrict the execution of unauthorized scripts. •Security Testing: Regularly conduct security assessments, including penetration testing and code reviews. •User Education: Educate users on the risks of XSS and safe browsing practices. •Use Security Libraries and Frameworks: Leverage security features provided by modern web frameworks and libraries to mitigate XSS risks.
  • 11.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. SCREEN SHOT LOGIN BYPASS
  • 12.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 13.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 14.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 15.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. SCREEN SHOT ADMIN CREDENTIALS ACCESS SQLi
  • 16.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 17.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 18.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 19.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 20.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 21.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 22.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 23.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 24.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. SCREEN SHOT CSRF
  • 25.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 26.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 27.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 28.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 29.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 30.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 31.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 32.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 33.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 34.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. XSS CROSS SITE SCRIPTING SCREEN SHOT (STORED )
  • 35.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 36.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 37.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 38.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 39.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 40.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 41.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 42.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 43.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. DOM XSS SCREEN SHOT
  • 44.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
  • 45.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. TOOLS USED IN PROJECT • TOOLS – BURPSUITE , WAPPALYZER , • PLATFORM USED- PORTSWIGGER • PASSIVE RECONNISSANCE – WHO.IS , EDGUR CODE USED - "><svg onload=alert(1)>for DOM XSS DOCUMENT.WRITE <><img src=1 onerror=alert(1)> FOR STORED DOM XSS
  • 46.
    CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material is prohibited and subject to legal action under breach of IP and confidentiality clauses. Thank You!