340 lines
77 KiB
XML
340 lines
77 KiB
XML
<?xml version="1.0" encoding="UTF-8"?><fo:root xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:fo="http://www.w3.org/1999/XSL/Format" line-height-shift-adjustment="disregard-shifts"><fo:layout-master-set><fo:simple-page-master margin-top="2cm" margin-bottom="1.8cm" margin-left="2cm" margin-right="2cm" page-height="29.7cm" page-width="21.0cm" master-name="Cover"><fo:region-body margin-top="1cm" margin-bottom="1cm" region-name="region-body"/><fo:region-before precedence="true" extent="0.6cm" region-name="region-before-cover"/><fo:region-after precedence="true" extent="0.6cm" padding="0" region-name="region-after-cover"/></fo:simple-page-master><fo:simple-page-master margin-top="2cm" margin-bottom="1.8cm" margin-left="2cm" margin-right="2cm" page-height="29.7cm" page-width="21.0cm" master-name="Content"><fo:region-body margin-top="1cm" margin-bottom="1cm" region-name="region-body"/><fo:region-before precedence="true" extent="0.6cm" region-name="region-before-content"/><fo:region-after precedence="true" extent="0.6cm" padding="0" region-name="region-after-content"/></fo:simple-page-master><fo:page-sequence-master master-name="Report"><fo:repeatable-page-master-alternatives><fo:conditional-page-master-reference master-reference="Cover" blank-or-not-blank="not-blank" page-position="first"/><fo:conditional-page-master-reference master-reference="Content" blank-or-not-blank="not-blank"/></fo:repeatable-page-master-alternatives></fo:page-sequence-master></fo:layout-master-set><fo:page-sequence master-reference="Report"><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-before-cover"><fo:block text-align="right" font-weight="bold">Confidential</fo:block></fo:static-content><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-before-content"><fo:block text-align="right" font-weight="bold">Confidential</fo:block></fo:static-content><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-after-cover"><fo:block text-align-last="justify"><fo:page-number/>/<fo:page-number-citation ref-id="EndOfDoc"/><fo:leader leader-pattern="space"/><fo:inline font-family="LiberationSansNarrow" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts">Radically Open Security B.V. - 60628081</fo:inline></fo:block></fo:static-content><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-after-content"><fo:block text-align-last="justify"><fo:page-number/>/<fo:page-number-citation ref-id="EndOfDoc"/><fo:leader leader-pattern="space"/><fo:inline font-family="LiberationSansNarrow" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts">Radically Open Security B.V. - 60628081</fo:inline></fo:block></fo:static-content><fo:flow font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-body"><fo:block>
|
||
<fo:block text-align="center" margin-bottom="5pt"><fo:external-graphic padding-top="2cm" padding-bottom="3cm" src="url(../graphics/logo.png)" width="70mm" content-width="scale-to-fit" content-height="scale-to-fit" scaling="uniform"/></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" text-align="center" font-size="16pt" margin-bottom="1cm" background-color="orange">PENETRATION TEST REPORT</fo:block><fo:block text-align="center" margin-bottom="1cm">for</fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" text-align="center" font-size="16pt" margin-bottom="6cm" background-color="silver" text-transform="capitalize">Sitting Duck B.V.</fo:block><fo:block break-after="page"><fo:table width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(66)"/><fo:table-column column-width="proportional-column-width(33)"/><fo:table-body><fo:table-row><fo:table-cell><fo:block/></fo:table-cell><fo:table-cell text-align="left"><fo:block> V1.0</fo:block><fo:block>Amsterdam</fo:block><fo:block>January 26th, 2015</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Document Properties</fo:block><fo:block margin-bottom="1.5cm"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column background-color="orange" border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column column-width="proportional-column-width(75)"/><fo:table-body><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Client</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Sitting Duck B.V.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Title</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>PENETRATION TEST REPORT</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Target</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>fishinabarrel.sittingduck.com</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Version</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>1.0</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Pentesters</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Melanie Rieback</fo:inline>, <fo:inline>Aristotle</fo:inline>, <fo:inline>George Boole</fo:inline>, <fo:inline>William of Ockham</fo:inline>, <fo:inline>Ludwig Josef Johann Wittgenstein</fo:inline></fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Authors</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline>, <fo:inline>Ernest Hemingway</fo:inline>, <fo:inline>JRR Tolkien</fo:inline>, <fo:inline>Arthur Conan Doyle</fo:inline></fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Reviewed by</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:block>Melanie Rieback</fo:block></fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Approved by</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Melanie Rieback</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Version control</fo:block><fo:block margin-bottom="1.5cm"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-body><fo:table-row background-color="orange" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Version</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Date</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Author</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Description</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.1</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 19th, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Initial draft</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.2</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 20th, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Ernest Hemingway</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Structure & contents revision</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.3</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 21st, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Added threat levels and recommendations</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.4</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 22nd, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline>, <fo:inline>JRR Tolkien</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Revision</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.5</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 23rd, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Revision</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>1.0</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 26th, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Arthur Conan Doyle</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Finalizing</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Contact</fo:block><fo:block margin-bottom="5pt">For more information about this Document and its
|
||
contents please contact Radically Open Security B.V.</fo:block><fo:block break-after="page"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column background-color="orange" border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column column-width="proportional-column-width(75)"/><fo:table-body border-width="1pt" border-style="solid" border-color="black"><fo:table-row><fo:table-cell padding="2pt"><fo:block>Name</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Melanie Rieback</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Address</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Zieseniskade 21</fo:block><fo:block>1017 RT Amsterdam</fo:block><fo:block>The Netherlands</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Phone</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>+31 6 10 21 32 40</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Email</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>info@radicallyopensecurity.com</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
|
||
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="0cm" background-color="orange">Table of Contents</fo:block><fo:block break-after="page"><fo:block><fo:table width="100%"><fo:table-column/><fo:table-column column-width="7mm"/><fo:table-body>
|
||
|
||
|
||
|
||
|
||
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="executiveSummary"><fo:inline>1</fo:inline> Executive Summary</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="executiveSummary"><fo:page-number-citation ref-id="executiveSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="introduction"><fo:inline>1.1</fo:inline> Introduction</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="introduction"><fo:page-number-citation ref-id="introduction"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="scope"><fo:inline>1.2</fo:inline> Scope of work</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="scope"><fo:page-number-citation ref-id="scope"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="objectives"><fo:inline>1.3</fo:inline> Project objectives</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="objectives"><fo:page-number-citation ref-id="objectives"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="timeline"><fo:inline>1.4</fo:inline> Timeline</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="timeline"><fo:page-number-citation ref-id="timeline"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="results"><fo:inline>1.5</fo:inline> Results in a Nutshell</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="results"><fo:page-number-citation ref-id="results"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="findingSummary"><fo:inline>1.6</fo:inline> Summary of Findings</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="findingSummary"><fo:page-number-citation ref-id="findingSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="recommendationSummary"><fo:inline>1.7</fo:inline> Summary of Recommendations</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="recommendationSummary"><fo:page-number-citation ref-id="recommendationSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="dataSummary"><fo:inline>1.8</fo:inline> Charts</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="dataSummary"><fo:page-number-citation ref-id="dataSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="threatlevelpie"><fo:inline>1.8.1</fo:inline> Findings by Threat Level</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="threatlevelpie"><fo:page-number-citation ref-id="threatlevelpie"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="typepie"><fo:inline>1.8.2</fo:inline> Findings by Type</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="typepie"><fo:page-number-citation ref-id="typepie"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
|
||
|
||
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="methodology"><fo:inline>2</fo:inline> Methodology</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="methodology"><fo:page-number-citation ref-id="methodology"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="planning"><fo:inline>2.1</fo:inline> Planning</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="planning"><fo:page-number-citation ref-id="planning"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="riskClassification"><fo:inline>2.2</fo:inline> Risk Classification</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="riskClassification"><fo:page-number-citation ref-id="riskClassification"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
|
||
|
||
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="recon"><fo:inline>3</fo:inline> Reconnaissance and Fingerprinting</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="recon"><fo:page-number-citation ref-id="recon"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="scans"><fo:inline>3.1</fo:inline> Automated Scans</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="scans"><fo:page-number-citation ref-id="scans"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="nmap"><fo:inline>3.2</fo:inline> nmap</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="nmap"><fo:page-number-citation ref-id="nmap"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
|
||
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="techSummary"><fo:inline>4</fo:inline> Pentest Technical Summary</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="techSummary"><fo:page-number-citation ref-id="techSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="findings"><fo:inline>4.1</fo:inline> Findings</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="findings"><fo:page-number-citation ref-id="findings"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="f1"><fo:inline>4.1.1</fo:inline> SID-001 — PHPInfo Disclosure</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="f1"><fo:page-number-citation ref-id="f1"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="f2"><fo:inline>4.1.2</fo:inline> SID-002 — A terrible XSS issue</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="f2"><fo:page-number-citation ref-id="f2"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="f3"><fo:inline>4.1.3</fo:inline> SID-003 — A not quite so terrible XSS issue</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="f3"><fo:page-number-citation ref-id="f3"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="nonFindings"><fo:inline>4.2</fo:inline> Non-Findings</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="nonFindings"><fo:page-number-citation ref-id="nonFindings"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="ftp"><fo:inline>4.2.1</fo:inline> NF-001 — FTP</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="ftp"><fo:page-number-citation ref-id="ftp"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="mail"><fo:inline>4.2.2</fo:inline> NF-002 — Mail Server</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="mail"><fo:page-number-citation ref-id="mail"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="sqlInjection"><fo:inline>4.2.3</fo:inline> NF-003 — SQL Code Injection</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="sqlInjection"><fo:page-number-citation ref-id="sqlInjection"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="heartbleed"><fo:inline>4.2.4</fo:inline> NF-004 — Heartbleed</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="heartbleed"><fo:page-number-citation ref-id="heartbleed"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="sp2"><fo:inline>4.2.5</fo:inline> NF-005 — Windows XP</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="sp2"><fo:page-number-citation ref-id="sp2"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
|
||
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="conclusion"><fo:inline>5</fo:inline> Conclusion</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="conclusion"><fo:page-number-citation ref-id="conclusion"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
|
||
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="testteam"><fo:inline> Appendix 1</fo:inline> Testing team</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="testteam"><fo:page-number-citation ref-id="testteam"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
|
||
</fo:table-body></fo:table></fo:block></fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="executiveSummary">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>1</fo:inline> Executive Summary</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="introduction">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.1</fo:inline> Introduction</fo:block>
|
||
<fo:block margin-bottom="5pt">Sitting Duck B.V. (“Sitting Duck”) has assigned the task of performing a 6-day
|
||
Penetration Test of the FishInABarrel Web Application to Radically
|
||
Open Security BV (hereafter “ROS”). Sitting Duck has made this
|
||
request to better evaluate the security of the application and to
|
||
identify application level vulnerabilities in order to see whether
|
||
the FishInABarrel Web Application is ready, security-wise, for
|
||
production deployment.</fo:block>
|
||
<fo:block margin-bottom="1.5cm">This report contains our findings as well as detailed explanations of
|
||
exactly how ROS performed the penetration test.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="scope">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.2</fo:inline> Scope of work</fo:block>
|
||
<fo:block margin-bottom="5pt">The scope of the Sitting Duck penetration test was limited to the
|
||
following target:</fo:block>
|
||
<fo:list-block xmlns:svg="http://www.w3.org/2000/svg" margin-bottom="5pt" provisional-distance-between-starts="0.75cm" provisional-label-separation="2.5mm" space-after="12pt" start-indent="1cm"><fo:list-item><fo:list-item-label end-indent="label-end()"><fo:block><fo:inline>•</fo:inline></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>fishinabarrel.sittingduck.com</fo:block></fo:list-item-body></fo:list-item></fo:list-block>
|
||
<fo:block margin-bottom="1.5cm">The penetration test was carried out from a black box perspective: no
|
||
information regarding the system(s) tested was provided by Sitting
|
||
Duck or FishInABarrel, although FishInABarrel did provide ROS with
|
||
two test user accounts.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="objectives">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.3</fo:inline> Project objectives</fo:block>
|
||
<fo:block margin-bottom="1.5cm">The objective of the security assessment is to gain insight into the
|
||
security of the host and the FishInABarrel Web Application.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="timeline">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.4</fo:inline> Timeline</fo:block>
|
||
<fo:block margin-bottom="1.5cm">The FishInABarrel Security Audit took place between January 14 and
|
||
January 16, 2015.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="results">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.5</fo:inline> Results in a Nutshell</fo:block>
|
||
<fo:block margin-bottom="1.5cm">During this pentest, we found quite a number of different security
|
||
problems – Cross-site Scripting (XSS) vulnerabilities, both stored
|
||
and reflected, Cross-site Request Forgery (CSRF) vulnerabilities,
|
||
information disclosures (multiple instances), and lack of brute
|
||
force protection.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="findingSummary">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.6</fo:inline> Summary of Findings</fo:block>
|
||
<fo:block xmlns:svg="http://www.w3.org/2000/svg"><fo:table margin-bottom="1.5cm" border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(12)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(22)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(50)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(16)"/><fo:table-body><fo:table-row background-color="orange" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>ID</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Type</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Description</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Threat level</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black" font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts"><fo:table-cell padding="2pt"><fo:block id="summaryTableThreatLevelHigh"><fo:basic-link color="blue" internal-destination="f2">SID-002</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
|
||
A general description of the problem.
|
||
</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>High</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black" font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts"><fo:table-cell padding="2pt"><fo:block id="summaryTableThreatLevelModerate"><fo:basic-link color="blue" internal-destination="f1">SID-001</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Information Leak</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
|
||
The phpinfo() function of the PHP language is readable,
|
||
resulting in a listing of all the runtime
|
||
information of the environment, thus disclosing
|
||
potentially valuable information to attackers.
|
||
</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Moderate</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black" font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts"><fo:table-cell padding="2pt"><fo:block id="summaryTableThreatLevelLow"><fo:basic-link color="blue" internal-destination="f3">SID-003</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
|
||
A description of the problem.
|
||
</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Low</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
|
||
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="recommendationSummary">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.7</fo:inline> Summary of Recommendations</fo:block>
|
||
<fo:block xmlns:svg="http://www.w3.org/2000/svg"><fo:table margin-bottom="1.5cm" border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(12)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(22)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(66)"/><fo:table-body><fo:table-row background-color="orange" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>ID</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Type</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Recommendation</fo:block></fo:table-cell></fo:table-row><fo:table-row font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block><fo:basic-link color="blue" internal-destination="f1">SID-001</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Information Leak</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
|
||
Here is where we write some tips to solve the
|
||
problem.
|
||
</fo:block></fo:table-cell></fo:table-row><fo:table-row font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block><fo:basic-link color="blue" internal-destination="f2">SID-002</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
|
||
This is where we solve everything and the sun starts
|
||
shining again.
|
||
</fo:block></fo:table-cell></fo:table-row><fo:table-row font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block><fo:basic-link color="blue" internal-destination="f3">SID-003</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
|
||
A ready solution.
|
||
</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
|
||
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="dataSummary">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.8</fo:inline> Charts</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="threatlevelpie">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.8.1</fo:inline> Findings by Threat Level</fo:block>
|
||
<fo:block xmlns:svg="http://www.w3.org/2000/svg" margin-bottom="5pt"><fo:table margin-top="15px"><fo:table-column column-width="250px"/><fo:table-column/><fo:table-body><fo:table-row keep-together.within-column="always"><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg width="200" height="200" viewBox="0 0 200 200"><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#ffed7f" d="M 100,100 l 0,-100 a100,100 0 1,1 -0.012690717924600648,8.052716111706104E-7 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="0.40099815271901207" y="42.510532868834886">33.3%</svg:text><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#ffbf7f" d="M 100,100 l 0,-100 a100,100 0 1,1 -86.59830982918015,150.00732681047168 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="100.00729716282133" y="214.99999976848437">33.3%</svg:text><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#FF5C00" d="M 100,100 l 0,-100 a100,100 0 0,1 86.60465542061571,149.99633646054895 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="199.59170521912853" y="42.49789350340111">33.3%</svg:text></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell><fo:block><fo:table background-color="#eeeeee"><fo:table-column column-width="20px"/><fo:table-column/><fo:table-body><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#FF5C00"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>High (<fo:basic-link text-decoration="underline" internal-destination="summaryTableThreatLevelHigh">1</fo:basic-link>)</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#ffbf7f"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Moderate (<fo:basic-link text-decoration="underline" internal-destination="summaryTableThreatLevelModerate">1</fo:basic-link>)</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#ffed7f"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Low (<fo:basic-link text-decoration="underline" internal-destination="summaryTableThreatLevelLow">1</fo:basic-link>)</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="typepie">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.8.2</fo:inline> Findings by Type</fo:block>
|
||
<fo:block xmlns:svg="http://www.w3.org/2000/svg" margin-bottom="5pt"><fo:table margin-top="15px"><fo:table-column column-width="250px"/><fo:table-column/><fo:table-body><fo:table-row keep-together.within-column="always"><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg width="200" height="200" viewBox="0 0 200 200"><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#B9A44C" d="M 100,100 l 0,-100 a100,100 0 1,1 -0.012690717924600648,8.052716111706104E-7 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="0.40099815271901207" y="42.510532868834886">33.3%</svg:text><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#D9D375" d="M 100,100 l 0,-100 a100,100 0 1,1 -86.59830982918015,150.00732681047168 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="199.59535373370807" y="157.49578692963127">66.7%</svg:text></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell><fo:block><fo:table background-color="#eeeeee"><fo:table-column column-width="20px"/><fo:table-column/><fo:table-body><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#D9D375"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS (2)</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#B9A44C"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Information leak (1)</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
|
||
</fo:block>
|
||
|
||
|
||
</fo:block>
|
||
</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="methodology" break-before="page">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>2</fo:inline> Methodology</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="planning">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>2.1</fo:inline> Planning</fo:block>
|
||
<fo:block margin-bottom="5pt">Our general approach during this penetration test was as follows:</fo:block>
|
||
<fo:list-block provisional-distance-between-starts="0.85cm" provisional-label-separation="2.5mm" margin-bottom="1.5cm" space-after="12pt" start-indent="1cm"><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>1. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Reconnaissance</fo:inline><fo:block/>We attempted to gather as much information as possible about the
|
||
target. Reconnaissance can take two forms: active and passive. A
|
||
passive attack is always the best starting point as this would normally defeat
|
||
intrusion detection systems and other forms of protection, etc., afforded to the
|
||
network. This would usually involve trying to discover publicly available
|
||
information by utilizing a web browser and visiting newsgroups etc. An active form
|
||
would be more intrusive and may show up in audit logs and may take the form of a
|
||
social engineering type of attack.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>2. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Enumeration</fo:inline><fo:block/>We used varied operating system fingerprinting tools to determine
|
||
what hosts are alive on the network and more importantly what services and operating
|
||
systems they are running. Research into these services would be carried out to
|
||
tailor the test to the discovered services.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>3. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Scanning</fo:inline><fo:block/>Through the use of vulnerability scanners, all discovered hosts would be tested
|
||
for vulnerabilities. The result would be analyzed to determine if there any
|
||
vulnerabilities that could be exploited to gain access to a target host on a
|
||
network.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>4. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Obtaining Access</fo:inline><fo:block/>Through the use of published exploits or weaknesses found in
|
||
applications, operating system and services access would then be attempted. This may
|
||
be done surreptitiously or by more brute force methods.</fo:block></fo:list-item-body></fo:list-item></fo:list-block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="riskClassification">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>2.2</fo:inline> Risk Classification</fo:block>
|
||
<fo:block margin-bottom="5pt">Throughout the document, each vulnerability or risk identified has been labeled and
|
||
categorized as:</fo:block>
|
||
<fo:list-block provisional-distance-between-starts="0.75cm" provisional-label-separation="2.5mm" space-after="12pt" start-indent="1cm"><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Extreme</fo:inline><fo:block/>Extreme risk of security controls being compromised with the possibility
|
||
of catastrophic financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">High</fo:inline><fo:block/>High risk of security controls being compromised with the potential for
|
||
significant financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Elevated</fo:inline><fo:block/>Elevated risk of security controls being compromised with the potential
|
||
for material financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Moderate</fo:inline><fo:block/>Moderate risk of security controls being compromised with the potential
|
||
for limited financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Low</fo:inline><fo:block/>Low risk of security controls being compromised with measurable negative
|
||
impacts as a result.</fo:block></fo:list-item-body></fo:list-item></fo:list-block>
|
||
<fo:block margin-bottom="1.5cm">Please note that this risk rating system was taken from the Penetration Testing Execution
|
||
Standard (PTES). For more information, see:
|
||
http://www.pentest-standard.org/index.php/Reporting. </fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="recon">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>3</fo:inline> Reconnaissance and Fingerprinting</fo:block>
|
||
<fo:block margin-bottom="5pt">Through automated scans we were able to gain the following information about the
|
||
software and infrastructure. Detailed scan output can be found in the
|
||
sections below.</fo:block>
|
||
|
||
<fo:block margin-bottom="5pt"><fo:table margin-bottom="1.5cm" table-layout="fixed" width="100%"><fo:table-body><fo:table-row keep-with-next.within-column="always">
|
||
<fo:table-cell padding="2pt" background-color="orange" border-style="solid" border-color="black" border-width="1pt"><fo:block>Fingerprinted Information</fo:block></fo:table-cell>
|
||
</fo:table-row><fo:table-row>
|
||
<fo:table-cell padding="2pt" border-style="solid" border-color="black" border-width="1pt"><fo:block text-align="left">Windows XP<fo:block/>Microsoft IIS 6.0<fo:block/>PHP 5.4.29<fo:block/>jQuery
|
||
1.7.2<fo:block/>Mailserver XYZ<fo:block/>FTPserver ABC</fo:block></fo:table-cell>
|
||
</fo:table-row></fo:table-body></fo:table></fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="scans">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>3.1</fo:inline> Automated Scans</fo:block>
|
||
<fo:block margin-bottom="5pt">As part of our active reconnaissance we used the following automated
|
||
scans:</fo:block>
|
||
<fo:list-block provisional-distance-between-starts="0.75cm" provisional-label-separation="2.5mm" space-after="12pt" start-indent="1cm"><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>nmap – <fo:basic-link color="blue" external-destination="http://nmap.org">http://nmap.org</fo:basic-link></fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>skipfish -
|
||
<fo:basic-link color="blue" external-destination="https://code.google.com/p/skipfish/">https://code.google.com/p/skipfish/</fo:basic-link></fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>sqlmap – <fo:basic-link color="blue" external-destination="http://sqlmap.org">http://sqlmap.org</fo:basic-link></fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>•</fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>Wapiti –
|
||
<fo:basic-link color="blue" external-destination="http://wapiti.sourceforge.net">http://wapiti.sourceforge.net</fo:basic-link></fo:block></fo:list-item-body></fo:list-item></fo:list-block>
|
||
<fo:block margin-bottom="1.5cm">Of these, only the output of nmap turned out to be useful; consequently
|
||
only nmap and output will be discussed in this section.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="nmap">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>3.2</fo:inline> nmap</fo:block>
|
||
<fo:block margin-bottom="5pt">Command:</fo:block>
|
||
<fo:block border-width="2pt" border-style="double" border-color="black" font-family="LiberationMono" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts" margin-bottom="8pt" white-space-collapse="false" linefeed-treatment="preserve" white-space-treatment="preserve" padding="4pt">$ nmap -vvvv -oA fishinabarrel.sittingduck.com_complete -sV -sC -A -p1-65535 -T5
|
||
fishinabarrel.sittingduck.com</fo:block>
|
||
|
||
<fo:block margin-bottom="5pt">Outcome:</fo:block>
|
||
<fo:block border-width="2pt" border-style="double" border-color="black" font-family="LiberationMono" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts" margin-bottom="8pt" white-space-collapse="false" linefeed-treatment="preserve" white-space-treatment="preserve" padding="4pt"> Nmap scan report for fishinabarrel.sittingduck.com (10.10.10.1)
|
||
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:43 EST
|
||
Initiating ARP Ping Scan against 10.10.10.1 [1 port] at 15:43
|
||
The ARP Ping Scan took 0.01s to scan 1 total hosts.
|
||
Initiating SYN Stealth Scan against fishinabarrel.sittingduck.com (10.10.10.1) [1680 ports] at 15:43
|
||
Discovered open port 22/tcp on 10.10.10.1
|
||
Discovered open port 80/tcp on 10.10.10.1
|
||
Discovered open port 8888/tcp on 10.10.10.1
|
||
Discovered open port 111/tcp on 10.10.10.1
|
||
Discovered open port 3306/tcp on 10.10.10.1
|
||
Discovered open port 957/tcp on 10.10.10.1
|
||
The SYN Stealth Scan took 0.30s to scan 1680 total ports.
|
||
Host fishinabarrel.sittingduck.com (10.10.10.1) appears to be up ... good.
|
||
Interesting ports on fishinabarrel.sittingduck.com (10.10.10.1):
|
||
Not shown: 1674 closed ports
|
||
PORT STATE SERVICE
|
||
22/tcp open ssh
|
||
25/tcp open smtp
|
||
80/tcp open http
|
||
110/tcp open pop3
|
||
111/tcp open rpcbind
|
||
957/tcp open unknown
|
||
3306/tcp open mysql
|
||
4000/tcp open dangerous service
|
||
|
||
Nmap finished: 1 IP address (1 host up) scanned in 0.485 seconds
|
||
Raw packets sent: 1681 (73.962KB) | Rcvd: 1681 (77.322KB)</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm">The scan revealed a very large number of open services on this machine,
|
||
which greatly increases the attack surface; see <fo:basic-link color="blue" internal-destination="f2">SID-002</fo:basic-link> (page <fo:page-number-citation ref-id="f2"/>) for
|
||
more information on the security risk.</fo:block>
|
||
|
||
</fo:block>
|
||
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="techSummary">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>4</fo:inline> Pentest Technical Summary</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="findings">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1</fo:inline> Findings</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm">We have identified the following issues:</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="f1">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1.1</fo:inline> SID-001 — PHPInfo Disclosure</fo:block><fo:table margin-bottom="8mm" width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(70)"/><fo:table-column column-width="proportional-column-width(30)"/><fo:table-body><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability ID: </fo:inline>SID-001</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability type: </fo:inline>Information Leak</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Threat level: </fo:inline>Moderate</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Description:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">The phpinfo() function of the PHP language is readable,
|
||
resulting in a listing of all the runtime
|
||
information of the environment, thus disclosing
|
||
potentially valuable information to attackers.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Technical description:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">This is where the good stuff goes. We give a detailed
|
||
technical description of the problem.</fo:block>
|
||
<fo:block margin-bottom="5pt">Illustrative picture of an evil hacker pondering dark
|
||
deeds:</fo:block>
|
||
<fo:block text-align="center" margin-bottom="5pt"><fo:block><fo:external-graphic src="../graphics/screenshot.jpg" height="10cm" content-width="scale-to-fit" content-height="scale-to-fit"/></fo:block><fo:block font-style="italic" text-align="center"/></fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Impact:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">This is where we explain how the sh*t is hitting the fan,
|
||
exactly.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Recommendation:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="1.5cm">Here is where we write some tips to solve the
|
||
problem.</fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="f2">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1.2</fo:inline> SID-002 — A terrible XSS issue</fo:block><fo:table margin-bottom="8mm" width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(70)"/><fo:table-column column-width="proportional-column-width(30)"/><fo:table-body><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability ID: </fo:inline>SID-002</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability type: </fo:inline>XSS</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Threat level: </fo:inline>High</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Description:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">A general description of the problem.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Technical description:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">This is we go into great detail about the
|
||
vulnerability.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Impact:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">This is where we explain why this vulnerability is a
|
||
problem.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Recommendation:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="1.5cm">This is where we solve everything and the sun starts
|
||
shining again.</fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="f3">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1.3</fo:inline> SID-003 — A not quite so terrible XSS issue</fo:block><fo:table margin-bottom="8mm" width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(70)"/><fo:table-column column-width="proportional-column-width(30)"/><fo:table-body><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability ID: </fo:inline>SID-003</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability type: </fo:inline>XSS</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Threat level: </fo:inline>Low</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Description:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">A description of the problem.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Technical description:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">Vulnerability described in detail.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Impact:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="5pt">Impact on security.</fo:block>
|
||
</fo:block>
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Recommendation:</fo:block><fo:block margin-bottom="8mm">
|
||
<fo:block margin-bottom="1.5cm">A ready solution.</fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="nonFindings">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2</fo:inline> Non-Findings</fo:block>
|
||
<fo:block margin-bottom="1.5cm">In this section we list some of the things that were tried but turned out
|
||
to be dead ends.</fo:block>
|
||
|
||
<fo:block margin-bottom="1.5cm" id="ftp">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.1</fo:inline> NF-001 — FTP</fo:block>
|
||
<fo:block margin-bottom="5pt">The server was running FTPserver ABC, the most recent version of
|
||
this particular piece of software. Anonymous login was
|
||
turned off and no relevant vulnerabilities or exploits were
|
||
found.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="mail">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.2</fo:inline> NF-002 — Mail Server</fo:block>
|
||
<fo:block margin-bottom="5pt">The server was running Mailserver XYZ, the most recent version of
|
||
this particular piece of software. No relevant
|
||
vulnerabilities or exploits were found. </fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="sqlInjection">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.3</fo:inline> NF-003 — SQL Code Injection</fo:block>
|
||
<fo:block margin-bottom="5pt">The following parameters are not vulnerable to SQL injection. </fo:block>
|
||
<fo:block margin-bottom="5pt">All parameters have been checked manually.</fo:block>
|
||
<fo:block border-width="2pt" border-style="double" border-color="black" font-family="LiberationMono" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts" margin-bottom="8pt" white-space-collapse="false" linefeed-treatment="preserve" white-space-treatment="preserve" padding="4pt">-file1.php
|
||
-file2.php
|
||
-file3.php
|
||
</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="heartbleed">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.4</fo:inline> NF-004 — Heartbleed</fo:block>
|
||
<fo:block margin-bottom="5pt">System was not vulnerable to heartbleed.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="sp2">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.5</fo:inline> NF-005 — Windows XP</fo:block>
|
||
<fo:block margin-bottom="1.5cm">The host is running Windows XP. As we all know, Windows XP is
|
||
bulletproof.</fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" id="conclusion">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>5</fo:inline> Conclusion</fo:block>
|
||
<fo:block margin-bottom="5pt">In the course of this penetration test, we have demonstrated that the
|
||
FishInABarrel Web Application faces a range of security issues which makes
|
||
it vulnerable to a number of different attacks. Vulnerabilities found
|
||
included: cross-site scripting (both stored and reflected), cross-site
|
||
request forgery, information disclosure and lack of brute force
|
||
protection.</fo:block>
|
||
<fo:block margin-bottom="5pt">Our conclusion is that there are a number of things that FishInABarrel BV has to
|
||
fix before Sitting Duck should use their software. A number of the security
|
||
issues highlighted in this report have fairly simple solutions, but these
|
||
should nevertheless be fixed before use of the FishInABarrel Web App
|
||
continues.</fo:block>
|
||
<fo:block margin-bottom="1.5cm">We finally want to emphasize that security is a process – and this penetration
|
||
test is just a one-time snapshot. Security posture must be continuously
|
||
evaluated and improved. Regular audits and ongoing improvements are
|
||
essential in order to maintain control of your corporate information
|
||
security. We hope that this pentest report (and the detailed explanations of
|
||
our findings) will contribute meaningfully towards that end. Don't hesitate
|
||
to let us know if you have any further questions or need further
|
||
clarification of anything in this report.</fo:block>
|
||
</fo:block>
|
||
<fo:block margin-bottom="1.5cm" break-before="page" id="testteam">
|
||
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline> Appendix 1</fo:inline> Testing team</fo:block>
|
||
<fo:block xmlns:svg="http://www.w3.org/2000/svg"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(75)"/><fo:table-body><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Aristotle</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Greek philosopher and scientist born in the Macedonian city of Stagira, Chalkidice, on the northern periphery of Classical Greece.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>George Boole</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>English mathematician, philosopher and logician. Works in the fields of differential equations and algebraic logic, and is now best known as the author of The Laws of Thought.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>William of Ockham</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>English Franciscan friar and scholastic philosopher and theologian. Considered to be one of the major figures of medieval thought. At the centre of some major intellectual and political controversies.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Ludwig Josef Johann Wittgenstein</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Austrian-British philosopher who works primarily in logic, the philosophy of mathematics, the philosophy of mind, and the philosophy of language.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Melanie Rieback</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Melanie Rieback is a former Asst. Prof. of Computer Science from the VU,
|
||
who is also the co-founder/CEO of Radically Open Security.</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
|
||
</fo:block>
|
||
</fo:block><fo:block id="EndOfDoc"/></fo:flow></fo:page-sequence></fo:root> |