0% found this document useful (0 votes)
55 views8 pages

Web-Application-VAPT-Sample-Report-PDF-CyberSapiens

Uploaded by

temperoryemail62
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views8 pages

Web-Application-VAPT-Sample-Report-PDF-CyberSapiens

Uploaded by

temperoryemail62
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1

Web Application VAPT


BY

CyberSapiens

Report on
XYZ

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP


2

Table of Contents
1. Document Attributes................................................................................................................... 3
2. Executive Summary ..................................................................................................................... 3
3. VAPT Test Graph.......................................................................................................................... 3
4. AUDITING SCOPE .............................................................................................................................. 4
5. METHODOLOGIES and Standards ..................................................................................................... 4
6. VAPT Project Timeframe ............................................................................................................. 4
7. Risk Ratings and Treat Level ........................................................................................................ 4
8. Vulnerability Summary ................................................................................................................ 5
9. Observations ............................................................................................................................ 5
10. Tools used for the Assessment ................................................................................................ 7
11. Conclusion ............................................................................................................................... 8

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP


3

1. Document Attributes
Date 02-07-2022
Version 1.0
Prepared by NAME
Reviewed by NAME
Submitted to NAME

2. Executive Summary

CyberSapiens United LLP was contracted by CLIENT to conduct a web application vulnerability
assessment and penetration testing activity to determine its exposure to the targeted attacks and
ensure that CLIENT web application is secure from advanced attack techniques.
This activity was conducted in a manner that malicious attacker is engaged to assess the provided
scope of CLIENT. The goals of the vulnerability assessment and Penetration Testing scan were:
• Identifying the threats or vulnerabilities that might be present on the web application
• Confidentiality of the CLIENT data that are stored on the company storage/servers

3. VAPT Test Graph


Type Count
Non-Vulnerable domains 0
Vulnerable domains 1

Risk Distrubusion

Non Vulnerable Assets Vulnerable Assets

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP


4

4. AUDITING SCOPE
Detailed list of assets is given in the below table:

SL NO URL Type of Asset

1 www.client.com Web application

5. METHODOLOGIES and Standards

The following methodologies and standards were used during the project.
• OWASP testing guide
• PTES
• WSTG
• Open Source Security Testing Methodology Manual (OSSTMM)
• Web Application Security Consortium Threat Classification (WASC-TC)

6. VAPT Project Timeframe


The VAPT activity was conducted between 24-01-2022 to 02-02-2022

7. Risk Ratings and Treat Level

Severity Description
Loss of business / Breach of internal data / Non-bearable financial and reputational
Critical
loss / Breakdown of assets / Access and modification of critical data
Loss of customer / Exposure of internal data / Noncompliance to regulations /
High Unavailability of the services / Access to configurational changes / High financial and
reputational loss / Access and modification of internal data
Customer service affected for one day / Noncompliance with internal requirements
Medium / Bearable financial and reputational loss / Disclosure of non-public data
Internal services affected / Minor inconvenience to customers / Very minimal
Low
financial and reputation loss

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP


5

8. Vulnerability Summary

A summary of vulnerabilities that have been discovered while performing web application
security assessment are given bellow:

Critical High Medium


6 3 1

Low Info Total


1 0 11

9. Observations
Vulnerability #1 XSS via File Upload
IP Address 0.0.0.0
Risk Critical
Description DESCRIPTION

Impact An XSS attack allows an attacker to execute arbitrary JavaScript in the


context of the attacked website and the attacked user. This can be abused
to steal session cookies, perform requests in the name of the victim or for
phishing attacks
Proof of Concept
(POC)

Remediation

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP


6

Vulnerability #2 Insecure Direct Object Reference


IP Address 0.0.0.0
Risk Critical
Description DESCRIPTION

Impact IDOR occur when a user being able to directly access resources that they
should not be able to access, using a user input functionality.
Proof of Concept
(POC)

Remediation DESCRIPTION

Vulnerability #3 Account take over through response manipulation


IP Address 0.0.0.0
Risk Critical
Description DESCRIPTION

Impact User’s account remains at risk, as even after logout a person having session
cookies can login into user account and make malicious changes.
Proof of Concept
(POC)

Remediation DESCRIPTION

Vulnerability #4 No rate limiting on forgot password option


IP Address 0.0.0.0
WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP
7

Risk Critical
Description DESCRIPTION

Impact The users email inbox will be spammed with multiple password reset links
which would cause trouble to the user
Proof of Concept
(POC)

Remediation DESCRIPTION

10.Tools used for the Assessment


The VAPT activities utilizes many automated tools and manual exploitation methodologies to
identify security vulnerabilities. A detailed list of tools used is given below.

Tool Name Description


Burp Suite Works as a proxy between client and the server
Dirb Directory searching

Gobuster Directory searching


Nmap Network mapper used for information gathering

jwtcat Tool used to detect and exploit well-known cryptographic


flaws present in JSON Web Token (JWT).
Nessus is a remote security scanning tool, which scans a
computer and raises an alert if it discovers any vulnerabilities that
Nessus
malicious hackers could use to gain access to any computer you
have connected to a network.
Cookie-Editor lets you efficiently create, edit and delete a cookie
Cookie-Editor for the current tab. Perfect for developing, quickly testing or even
manually managing your cookies for your privacy.
Wappalyzer is a browser extension that uncovers the
Wappalyzer
technologies used on websites. It detects content management

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP


8

systems, ecommerce platforms, web servers, JavaScript


frameworks, analytics tools and many more.
Exif Tool is a powerful tool used to extract metadata of a file. It
is used not only on images but some other formats of files like
Exif Tool
PDF and mp4 etc. It enables us to update and remove metadata
of files and gives a lot of information about files.
These are intelligent tools used for information gathering and
Amass, Subfinder, enhancement of the attack surface. This open-source tool helps
Sublist3r in identifying hidden resource/targets through DNS enumeration
and network mapping.
These are the automated tools used to fuzz the directories. It has
DirSearch, various key features of manipulation the method from GET to
AssertFinder, Ffuf POST and vice versa. We can use various wordlists for fuzzing
the host as well.
This tool can identify and recognize all the web technologies
available on the target website. This tool can identify
Whatweb
technologies used by websites such as blogging, content
management system, all JavaScript libraries.

11.Conclusion
Overall, we found the Assets tested to be well designed and to be utilizing many solid security
practices. However, few misconfigurations/vulnerabilities were identified which are given above.
We recommend to immediately fix the issue identified to make the systems risk free and secure.

WEB APPLICATION VAPT CYBERSAPIENS UNITED LLP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy