pentext/xml/target/report.fo

340 lines
77 KiB
XML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?><fo:root xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:fo="http://www.w3.org/1999/XSL/Format" line-height-shift-adjustment="disregard-shifts"><fo:layout-master-set><fo:simple-page-master margin-top="2cm" margin-bottom="1.8cm" margin-left="2cm" margin-right="2cm" page-height="29.7cm" page-width="21.0cm" master-name="Cover"><fo:region-body margin-top="1cm" margin-bottom="1cm" region-name="region-body"/><fo:region-before precedence="true" extent="0.6cm" region-name="region-before-cover"/><fo:region-after precedence="true" extent="0.6cm" padding="0" region-name="region-after-cover"/></fo:simple-page-master><fo:simple-page-master margin-top="2cm" margin-bottom="1.8cm" margin-left="2cm" margin-right="2cm" page-height="29.7cm" page-width="21.0cm" master-name="Content"><fo:region-body margin-top="1cm" margin-bottom="1cm" region-name="region-body"/><fo:region-before precedence="true" extent="0.6cm" region-name="region-before-content"/><fo:region-after precedence="true" extent="0.6cm" padding="0" region-name="region-after-content"/></fo:simple-page-master><fo:page-sequence-master master-name="Report"><fo:repeatable-page-master-alternatives><fo:conditional-page-master-reference master-reference="Cover" blank-or-not-blank="not-blank" page-position="first"/><fo:conditional-page-master-reference master-reference="Content" blank-or-not-blank="not-blank"/></fo:repeatable-page-master-alternatives></fo:page-sequence-master></fo:layout-master-set><fo:page-sequence master-reference="Report"><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-before-cover"><fo:block text-align="right" font-weight="bold">Confidential</fo:block></fo:static-content><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-before-content"><fo:block text-align="right" font-weight="bold">Confidential</fo:block></fo:static-content><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-after-cover"><fo:block text-align-last="justify"><fo:page-number/>/<fo:page-number-citation ref-id="EndOfDoc"/><fo:leader leader-pattern="space"/><fo:inline font-family="LiberationSansNarrow" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts">Radically Open Security B.V. -  60628081</fo:inline></fo:block></fo:static-content><fo:static-content font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-after-content"><fo:block text-align-last="justify"><fo:page-number/>/<fo:page-number-citation ref-id="EndOfDoc"/><fo:leader leader-pattern="space"/><fo:inline font-family="LiberationSansNarrow" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts">Radically Open Security B.V. -  60628081</fo:inline></fo:block></fo:static-content><fo:flow font-family="LiberationSansNarrow" font-size="12pt" color="black" line-height-shift-adjustment="disregard-shifts" flow-name="region-body"><fo:block>
<fo:block text-align="center" margin-bottom="5pt"><fo:external-graphic padding-top="2cm" padding-bottom="3cm" src="url(../graphics/logo.png)" width="70mm" content-width="scale-to-fit" content-height="scale-to-fit" scaling="uniform"/></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" text-align="center" font-size="16pt" margin-bottom="1cm" background-color="orange">PENETRATION TEST REPORT</fo:block><fo:block text-align="center" margin-bottom="1cm">for</fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" text-align="center" font-size="16pt" margin-bottom="6cm" background-color="silver" text-transform="capitalize">Sitting Duck B.V.</fo:block><fo:block break-after="page"><fo:table width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(66)"/><fo:table-column column-width="proportional-column-width(33)"/><fo:table-body><fo:table-row><fo:table-cell><fo:block/></fo:table-cell><fo:table-cell text-align="left"><fo:block> V1.0</fo:block><fo:block>Amsterdam</fo:block><fo:block>January 26th, 2015</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Document Properties</fo:block><fo:block margin-bottom="1.5cm"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column background-color="orange" border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column column-width="proportional-column-width(75)"/><fo:table-body><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Client</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Sitting Duck B.V.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Title</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>PENETRATION TEST REPORT</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Target</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>fishinabarrel.sittingduck.com</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Version</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>1.0</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Pentesters</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Melanie Rieback</fo:inline>, <fo:inline>Aristotle</fo:inline>, <fo:inline>George Boole</fo:inline>, <fo:inline>William of Ockham</fo:inline>, <fo:inline>Ludwig Josef Johann Wittgenstein</fo:inline></fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Authors</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline>, <fo:inline>Ernest Hemingway</fo:inline>, <fo:inline>JRR Tolkien</fo:inline>, <fo:inline>Arthur Conan Doyle</fo:inline></fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Reviewed by</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:block>Melanie Rieback</fo:block></fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Approved by</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Melanie Rieback</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Version control</fo:block><fo:block margin-bottom="1.5cm"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-body><fo:table-row background-color="orange" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Version</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Date</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Author</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Description</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.1</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 19th, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Initial draft</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.2</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 20th, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Ernest Hemingway</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Structure &amp; contents revision</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.3</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 21st, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Added threat levels and recommendations</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.4</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 22nd, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline>, <fo:inline>JRR Tolkien</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Revision</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block> 0.5</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 23rd, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Patricia Piolon</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Revision</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>1.0</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>January 26th, 2015</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block><fo:inline>Arthur Conan Doyle</fo:inline></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Finalizing</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block><fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Contact</fo:block><fo:block margin-bottom="5pt">For more information about this Document and its
contents please contact Radically Open Security B.V.</fo:block><fo:block break-after="page"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column background-color="orange" border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column column-width="proportional-column-width(75)"/><fo:table-body border-width="1pt" border-style="solid" border-color="black"><fo:table-row><fo:table-cell padding="2pt"><fo:block>Name</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Melanie Rieback</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Address</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Zieseniskade 21</fo:block><fo:block>1017 RT Amsterdam</fo:block><fo:block>The Netherlands</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Phone</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>+31 6 10 21 32 40</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Email</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>info@radicallyopensecurity.com</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="0cm" background-color="orange">Table of Contents</fo:block><fo:block break-after="page"><fo:block><fo:table width="100%"><fo:table-column/><fo:table-column column-width="7mm"/><fo:table-body>
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="executiveSummary"><fo:inline>1</fo:inline>  Executive Summary</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="executiveSummary"><fo:page-number-citation ref-id="executiveSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="introduction"><fo:inline>1.1</fo:inline>  Introduction</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="introduction"><fo:page-number-citation ref-id="introduction"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="scope"><fo:inline>1.2</fo:inline>  Scope of work</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="scope"><fo:page-number-citation ref-id="scope"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="objectives"><fo:inline>1.3</fo:inline>  Project objectives</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="objectives"><fo:page-number-citation ref-id="objectives"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="timeline"><fo:inline>1.4</fo:inline>  Timeline</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="timeline"><fo:page-number-citation ref-id="timeline"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="results"><fo:inline>1.5</fo:inline>  Results in a Nutshell</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="results"><fo:page-number-citation ref-id="results"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="findingSummary"><fo:inline>1.6</fo:inline>  Summary of Findings</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="findingSummary"><fo:page-number-citation ref-id="findingSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="recommendationSummary"><fo:inline>1.7</fo:inline>  Summary of Recommendations</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="recommendationSummary"><fo:page-number-citation ref-id="recommendationSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="dataSummary"><fo:inline>1.8</fo:inline>  Charts</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="dataSummary"><fo:page-number-citation ref-id="dataSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="threatlevelpie"><fo:inline>1.8.1</fo:inline>  Findings by Threat Level</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="threatlevelpie"><fo:page-number-citation ref-id="threatlevelpie"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="typepie"><fo:inline>1.8.2</fo:inline>  Findings by Type</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="typepie"><fo:page-number-citation ref-id="typepie"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="methodology"><fo:inline>2</fo:inline>  Methodology</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="methodology"><fo:page-number-citation ref-id="methodology"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="planning"><fo:inline>2.1</fo:inline>  Planning</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="planning"><fo:page-number-citation ref-id="planning"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="riskClassification"><fo:inline>2.2</fo:inline>  Risk Classification</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="riskClassification"><fo:page-number-citation ref-id="riskClassification"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="recon"><fo:inline>3</fo:inline>  Reconnaissance and Fingerprinting</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="recon"><fo:page-number-citation ref-id="recon"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="scans"><fo:inline>3.1</fo:inline>  Automated Scans</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="scans"><fo:page-number-citation ref-id="scans"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="nmap"><fo:inline>3.2</fo:inline>  nmap</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="nmap"><fo:page-number-citation ref-id="nmap"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="techSummary"><fo:inline>4</fo:inline>  Pentest Technical Summary</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="techSummary"><fo:page-number-citation ref-id="techSummary"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="findings"><fo:inline>4.1</fo:inline>  Findings</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="findings"><fo:page-number-citation ref-id="findings"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="f1"><fo:inline>4.1.1</fo:inline>  SID-001 — PHPInfo Disclosure</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="f1"><fo:page-number-citation ref-id="f1"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="f2"><fo:inline>4.1.2</fo:inline>  SID-002 — A terrible XSS issue</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="f2"><fo:page-number-citation ref-id="f2"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="f3"><fo:inline>4.1.3</fo:inline>  SID-003 — A not quite so terrible XSS issue</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="f3"><fo:page-number-citation ref-id="f3"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="nonFindings"><fo:inline>4.2</fo:inline>  Non-Findings</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="nonFindings"><fo:page-number-citation ref-id="nonFindings"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="ftp"><fo:inline>4.2.1</fo:inline>  NF-001 — FTP</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="ftp"><fo:page-number-citation ref-id="ftp"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="mail"><fo:inline>4.2.2</fo:inline>  NF-002 — Mail Server</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="mail"><fo:page-number-citation ref-id="mail"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="sqlInjection"><fo:inline>4.2.3</fo:inline>  NF-003 — SQL Code Injection</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="sqlInjection"><fo:page-number-citation ref-id="sqlInjection"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="heartbleed"><fo:inline>4.2.4</fo:inline>  NF-004 — Heartbleed</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="heartbleed"><fo:page-number-citation ref-id="heartbleed"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="sp2"><fo:inline>4.2.5</fo:inline>  NF-005 — Windows XP</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="sp2"><fo:page-number-citation ref-id="sp2"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="conclusion"><fo:inline>5</fo:inline>  Conclusion</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="conclusion"><fo:page-number-citation ref-id="conclusion"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
<fo:table-row><fo:table-cell text-align-last="justify"><fo:block><fo:basic-link internal-destination="testteam"><fo:inline> Appendix 1</fo:inline>  Testing team</fo:basic-link> <fo:leader leader-pattern="dots" leader-alignment="reference-area" leader-length.maximum="21cm"/></fo:block></fo:table-cell><fo:table-cell padding-right="3pt" display-align="after"><fo:block text-align="right"><fo:basic-link internal-destination="testteam"><fo:page-number-citation ref-id="testteam"/></fo:basic-link></fo:block></fo:table-cell></fo:table-row>
</fo:table-body></fo:table></fo:block></fo:block>
<fo:block margin-bottom="1.5cm" id="executiveSummary">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>1</fo:inline>   Executive Summary</fo:block>
<fo:block margin-bottom="1.5cm" id="introduction">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.1</fo:inline>   Introduction</fo:block>
<fo:block margin-bottom="5pt">Sitting Duck B.V. (“Sitting Duck”) has assigned the task of performing a 6-day
Penetration Test of the FishInABarrel Web Application to Radically
Open Security BV (hereafter “ROS”). Sitting Duck has made this
request to better evaluate the security of the application and to
identify application level vulnerabilities in order to see whether
the FishInABarrel Web Application is ready, security-wise, for
production deployment.</fo:block>
<fo:block margin-bottom="1.5cm">This report contains our findings as well as detailed explanations of
exactly how ROS performed the penetration test.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="scope">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.2</fo:inline>   Scope of work</fo:block>
<fo:block margin-bottom="5pt">The scope of the Sitting Duck penetration test was limited to the
following target:</fo:block>
<fo:list-block xmlns:svg="http://www.w3.org/2000/svg" margin-bottom="5pt" provisional-distance-between-starts="0.75cm" provisional-label-separation="2.5mm" space-after="12pt" start-indent="1cm"><fo:list-item><fo:list-item-label end-indent="label-end()"><fo:block><fo:inline></fo:inline></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>fishinabarrel.sittingduck.com</fo:block></fo:list-item-body></fo:list-item></fo:list-block>
<fo:block margin-bottom="1.5cm">The penetration test was carried out from a black box perspective: no
information regarding the system(s) tested was provided by Sitting
Duck or FishInABarrel, although FishInABarrel did provide ROS with
two test user accounts.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="objectives">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.3</fo:inline>   Project objectives</fo:block>
<fo:block margin-bottom="1.5cm">The objective of the security assessment is to gain insight into the
security of the host and the FishInABarrel Web Application.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="timeline">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.4</fo:inline>   Timeline</fo:block>
<fo:block margin-bottom="1.5cm">The FishInABarrel Security Audit took place between January 14 and
January 16, 2015.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="results">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.5</fo:inline>   Results in a Nutshell</fo:block>
<fo:block margin-bottom="1.5cm">During this pentest, we found quite a number of different security
problems Cross-site Scripting (XSS) vulnerabilities, both stored
and reflected, Cross-site Request Forgery (CSRF) vulnerabilities,
information disclosures (multiple instances), and lack of brute
force protection.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="findingSummary">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.6</fo:inline>   Summary of Findings</fo:block>
<fo:block xmlns:svg="http://www.w3.org/2000/svg"><fo:table margin-bottom="1.5cm" border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(12)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(22)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(50)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(16)"/><fo:table-body><fo:table-row background-color="orange" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>ID</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Type</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Description</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Threat level</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black" font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts"><fo:table-cell padding="2pt"><fo:block id="summaryTableThreatLevelHigh"><fo:basic-link color="blue" internal-destination="f2">SID-002</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
A general description of the problem.
</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>High</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black" font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts"><fo:table-cell padding="2pt"><fo:block id="summaryTableThreatLevelModerate"><fo:basic-link color="blue" internal-destination="f1">SID-001</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Information Leak</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
The phpinfo() function of the PHP language is readable,
resulting in a listing of all the runtime
information of the environment, thus disclosing
potentially valuable information to attackers.
</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Moderate</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black" font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts"><fo:table-cell padding="2pt"><fo:block id="summaryTableThreatLevelLow"><fo:basic-link color="blue" internal-destination="f3">SID-003</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
A description of the problem.
</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Low</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="recommendationSummary">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.7</fo:inline>   Summary of Recommendations</fo:block>
<fo:block xmlns:svg="http://www.w3.org/2000/svg"><fo:table margin-bottom="1.5cm" border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(12)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(22)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(66)"/><fo:table-body><fo:table-row background-color="orange" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>ID</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Type</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Recommendation</fo:block></fo:table-cell></fo:table-row><fo:table-row font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block><fo:basic-link color="blue" internal-destination="f1">SID-001</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Information Leak</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
Here is where we write some tips to solve the
problem.
</fo:block></fo:table-cell></fo:table-row><fo:table-row font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block><fo:basic-link color="blue" internal-destination="f2">SID-002</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
This is where we solve everything and the sun starts
shining again.
</fo:block></fo:table-cell></fo:table-row><fo:table-row font-family="LiberationSansNarrow" font-size="10pt" color="black" line-height-shift-adjustment="disregard-shifts" border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block><fo:basic-link color="blue" internal-destination="f3">SID-003</fo:basic-link></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>
A ready solution.
</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="dataSummary">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.8</fo:inline>   Charts</fo:block>
<fo:block margin-bottom="1.5cm" id="threatlevelpie">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.8.1</fo:inline>   Findings by Threat Level</fo:block>
<fo:block xmlns:svg="http://www.w3.org/2000/svg" margin-bottom="5pt"><fo:table margin-top="15px"><fo:table-column column-width="250px"/><fo:table-column/><fo:table-body><fo:table-row keep-together.within-column="always"><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg width="200" height="200" viewBox="0 0 200 200"><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#ffed7f" d="M 100,100 l 0,-100 a100,100 0 1,1 -0.012690717924600648,8.052716111706104E-7 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="0.40099815271901207" y="42.510532868834886">33.3%</svg:text><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#ffbf7f" d="M 100,100 l 0,-100 a100,100 0 1,1 -86.59830982918015,150.00732681047168 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="100.00729716282133" y="214.99999976848437">33.3%</svg:text><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#FF5C00" d="M 100,100 l 0,-100 a100,100 0 0,1 86.60465542061571,149.99633646054895 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="199.59170521912853" y="42.49789350340111">33.3%</svg:text></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell><fo:block><fo:table background-color="#eeeeee"><fo:table-column column-width="20px"/><fo:table-column/><fo:table-body><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#FF5C00"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>High (<fo:basic-link text-decoration="underline" internal-destination="summaryTableThreatLevelHigh">1</fo:basic-link>)</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#ffbf7f"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Moderate (<fo:basic-link text-decoration="underline" internal-destination="summaryTableThreatLevelModerate">1</fo:basic-link>)</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#ffed7f"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Low (<fo:basic-link text-decoration="underline" internal-destination="summaryTableThreatLevelLow">1</fo:basic-link>)</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="typepie">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>1.8.2</fo:inline>   Findings by Type</fo:block>
<fo:block xmlns:svg="http://www.w3.org/2000/svg" margin-bottom="5pt"><fo:table margin-top="15px"><fo:table-column column-width="250px"/><fo:table-column/><fo:table-body><fo:table-row keep-together.within-column="always"><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg width="200" height="200" viewBox="0 0 200 200"><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#B9A44C" d="M 100,100 l 0,-100 a100,100 0 1,1 -0.012690717924600648,8.052716111706104E-7 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="0.40099815271901207" y="42.510532868834886">33.3%</svg:text><svg:path stroke="black" stroke-width="1" stroke-linejoin="round" fill="#D9D375" d="M 100,100 l 0,-100 a100,100 0 1,1 -86.59830982918015,150.00732681047168 z"/><svg:text font-family="LiberationSansNarrow" font-size="10pt" color="black" text-anchor="middle" x="199.59535373370807" y="157.49578692963127">66.7%</svg:text></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell><fo:block><fo:table background-color="#eeeeee"><fo:table-column column-width="20px"/><fo:table-column/><fo:table-body><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#D9D375"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>XSS (2)</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt"><fo:block><fo:instream-foreign-object><svg:svg height="13" width="13"><svg:rect stroke="black" stroke-width="1" stroke-linejoin="round" height="11" width="11" fill="#B9A44C"/></svg:svg></fo:instream-foreign-object></fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Information leak (1)</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
</fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="methodology" break-before="page">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>2</fo:inline>   Methodology</fo:block>
<fo:block margin-bottom="1.5cm" id="planning">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>2.1</fo:inline>   Planning</fo:block>
<fo:block margin-bottom="5pt">Our general approach during this penetration test was as follows:</fo:block>
<fo:list-block provisional-distance-between-starts="0.85cm" provisional-label-separation="2.5mm" margin-bottom="1.5cm" space-after="12pt" start-indent="1cm"><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>1. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Reconnaissance</fo:inline><fo:block/>We attempted to gather as much information as possible about the
target. Reconnaissance can take two forms: active and passive. A
passive attack is always the best starting point as this would normally defeat
intrusion detection systems and other forms of protection, etc., afforded to the
network. This would usually involve trying to discover publicly available
information by utilizing a web browser and visiting newsgroups etc. An active form
would be more intrusive and may show up in audit logs and may take the form of a
social engineering type of attack.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>2. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Enumeration</fo:inline><fo:block/>We used varied operating system fingerprinting tools to determine
what hosts are alive on the network and more importantly what services and operating
systems they are running. Research into these services would be carried out to
tailor the test to the discovered services.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>3. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Scanning</fo:inline><fo:block/>Through the use of vulnerability scanners, all discovered hosts would be tested
for vulnerabilities. The result would be analyzed to determine if there any
vulnerabilities that could be exploited to gain access to a target host on a
network.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block>4. </fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Obtaining Access</fo:inline><fo:block/>Through the use of published exploits or weaknesses found in
applications, operating system and services access would then be attempted. This may
be done surreptitiously or by more brute force methods.</fo:block></fo:list-item-body></fo:list-item></fo:list-block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="riskClassification">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>2.2</fo:inline>   Risk Classification</fo:block>
<fo:block margin-bottom="5pt">Throughout the document, each vulnerability or risk identified has been labeled and
categorized as:</fo:block>
<fo:list-block provisional-distance-between-starts="0.75cm" provisional-label-separation="2.5mm" space-after="12pt" start-indent="1cm"><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Extreme</fo:inline><fo:block/>Extreme risk of security controls being compromised with the possibility
of catastrophic financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">High</fo:inline><fo:block/>High risk of security controls being compromised with the potential for
significant financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Elevated</fo:inline><fo:block/>Elevated risk of security controls being compromised with the potential
for material financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Moderate</fo:inline><fo:block/>Moderate risk of security controls being compromised with the potential
for limited financial/reputational losses occurring as a result.</fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block><fo:inline font-weight="bold">Low</fo:inline><fo:block/>Low risk of security controls being compromised with measurable negative
impacts as a result.</fo:block></fo:list-item-body></fo:list-item></fo:list-block>
<fo:block margin-bottom="1.5cm">Please note that this risk rating system was taken from the Penetration Testing Execution
Standard (PTES). For more information, see:
http://www.pentest-standard.org/index.php/Reporting. </fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="recon">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>3</fo:inline>   Reconnaissance and Fingerprinting</fo:block>
<fo:block margin-bottom="5pt">Through automated scans we were able to gain the following information about the
software and infrastructure. Detailed scan output can be found in the
sections below.</fo:block>
<fo:block margin-bottom="5pt"><fo:table margin-bottom="1.5cm" table-layout="fixed" width="100%"><fo:table-body><fo:table-row keep-with-next.within-column="always">
<fo:table-cell padding="2pt" background-color="orange" border-style="solid" border-color="black" border-width="1pt"><fo:block>Fingerprinted Information</fo:block></fo:table-cell>
</fo:table-row><fo:table-row>
<fo:table-cell padding="2pt" border-style="solid" border-color="black" border-width="1pt"><fo:block text-align="left">Windows XP<fo:block/>Microsoft IIS 6.0<fo:block/>PHP 5.4.29<fo:block/>jQuery
1.7.2<fo:block/>Mailserver XYZ<fo:block/>FTPserver ABC</fo:block></fo:table-cell>
</fo:table-row></fo:table-body></fo:table></fo:block>
<fo:block margin-bottom="1.5cm" id="scans">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>3.1</fo:inline>   Automated Scans</fo:block>
<fo:block margin-bottom="5pt">As part of our active reconnaissance we used the following automated
scans:</fo:block>
<fo:list-block provisional-distance-between-starts="0.75cm" provisional-label-separation="2.5mm" space-after="12pt" start-indent="1cm"><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>nmap <fo:basic-link color="blue" external-destination="http://nmap.org">http://nmap.org</fo:basic-link></fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>skipfish -
<fo:basic-link color="blue" external-destination="https://code.google.com/p/skipfish/">https://code.google.com/p/skipfish/</fo:basic-link></fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>sqlmap <fo:basic-link color="blue" external-destination="http://sqlmap.org">http://sqlmap.org</fo:basic-link></fo:block></fo:list-item-body></fo:list-item><fo:list-item margin-bottom="5pt"><fo:list-item-label end-indent="label-end()"><fo:block></fo:block></fo:list-item-label><fo:list-item-body start-indent="body-start()"><fo:block>Wapiti
<fo:basic-link color="blue" external-destination="http://wapiti.sourceforge.net">http://wapiti.sourceforge.net</fo:basic-link></fo:block></fo:list-item-body></fo:list-item></fo:list-block>
<fo:block margin-bottom="1.5cm">Of these, only the output of nmap turned out to be useful; consequently
only nmap and output will be discussed in this section.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="nmap">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>3.2</fo:inline>   nmap</fo:block>
<fo:block margin-bottom="5pt">Command:</fo:block>
<fo:block border-width="2pt" border-style="double" border-color="black" font-family="LiberationMono" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts" margin-bottom="8pt" white-space-collapse="false" linefeed-treatment="preserve" white-space-treatment="preserve" padding="4pt">$ nmap -vvvv -oA fishinabarrel.sittingduck.com_complete -sV -sC -A -p1-65535 -T5
fishinabarrel.sittingduck.com</fo:block>
<fo:block margin-bottom="5pt">Outcome:</fo:block>
<fo:block border-width="2pt" border-style="double" border-color="black" font-family="LiberationMono" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts" margin-bottom="8pt" white-space-collapse="false" linefeed-treatment="preserve" white-space-treatment="preserve" padding="4pt"> Nmap scan report for fishinabarrel.sittingduck.com (10.10.10.1)
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2013-11-11 15:43 EST
Initiating ARP Ping Scan against 10.10.10.1 [1 port] at 15:43
The ARP Ping Scan took 0.01s to scan 1 total hosts.
Initiating SYN Stealth Scan against fishinabarrel.sittingduck.com (10.10.10.1) [1680 ports] at 15:43
Discovered open port 22/tcp on 10.10.10.1
Discovered open port 80/tcp on 10.10.10.1
Discovered open port 8888/tcp on 10.10.10.1
Discovered open port 111/tcp on 10.10.10.1
Discovered open port 3306/tcp on 10.10.10.1
Discovered open port 957/tcp on 10.10.10.1
The SYN Stealth Scan took 0.30s to scan 1680 total ports.
Host fishinabarrel.sittingduck.com (10.10.10.1) appears to be up ... good.
Interesting ports on fishinabarrel.sittingduck.com (10.10.10.1):
Not shown: 1674 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
957/tcp open unknown
3306/tcp open mysql
4000/tcp open dangerous service
Nmap finished: 1 IP address (1 host up) scanned in 0.485 seconds
Raw packets sent: 1681 (73.962KB) | Rcvd: 1681 (77.322KB)</fo:block>
<fo:block margin-bottom="1.5cm">The scan revealed a very large number of open services on this machine,
which greatly increases the attack surface; see <fo:basic-link color="blue" internal-destination="f2">SID-002</fo:basic-link> (page <fo:page-number-citation ref-id="f2"/>) for
more information on the security risk.</fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="techSummary">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>4</fo:inline>   Pentest Technical Summary</fo:block>
<fo:block margin-bottom="1.5cm" id="findings">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1</fo:inline>   Findings</fo:block>
<fo:block margin-bottom="1.5cm">We have identified the following issues:</fo:block>
<fo:block margin-bottom="1.5cm" id="f1">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1.1</fo:inline>   SID-001 — PHPInfo Disclosure</fo:block><fo:table margin-bottom="8mm" width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(70)"/><fo:table-column column-width="proportional-column-width(30)"/><fo:table-body><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability ID: </fo:inline>SID-001</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability type: </fo:inline>Information Leak</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Threat level: </fo:inline>Moderate</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Description:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">The phpinfo() function of the PHP language is readable,
resulting in a listing of all the runtime
information of the environment, thus disclosing
potentially valuable information to attackers.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Technical description:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">This is where the good stuff goes. We give a detailed
technical description of the problem.</fo:block>
<fo:block margin-bottom="5pt">Illustrative picture of an evil hacker pondering dark
deeds:</fo:block>
<fo:block text-align="center" margin-bottom="5pt"><fo:block><fo:external-graphic src="../graphics/screenshot.jpg" height="10cm" content-width="scale-to-fit" content-height="scale-to-fit"/></fo:block><fo:block font-style="italic" text-align="center"/></fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Impact:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">This is where we explain how the sh*t is hitting the fan,
exactly.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Recommendation:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="1.5cm">Here is where we write some tips to solve the
problem.</fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="f2">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1.2</fo:inline>   SID-002 — A terrible XSS issue</fo:block><fo:table margin-bottom="8mm" width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(70)"/><fo:table-column column-width="proportional-column-width(30)"/><fo:table-body><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability ID: </fo:inline>SID-002</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability type: </fo:inline>XSS</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Threat level: </fo:inline>High</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Description:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">A general description of the problem.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Technical description:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">This is we go into great detail about the
vulnerability.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Impact:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">This is where we explain why this vulnerability is a
problem.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Recommendation:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="1.5cm">This is where we solve everything and the sun starts
shining again.</fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="f3">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.1.3</fo:inline>   SID-003 — A not quite so terrible XSS issue</fo:block><fo:table margin-bottom="8mm" width="100%" table-layout="fixed"><fo:table-column column-width="proportional-column-width(70)"/><fo:table-column column-width="proportional-column-width(30)"/><fo:table-body><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability ID: </fo:inline>SID-003</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Vulnerability type: </fo:inline>XSS</fo:block></fo:table-cell></fo:table-row><fo:table-row><fo:table-cell padding="2pt" number-columns-spanned="2"><fo:block margin-bottom="5pt"><fo:inline font-weight="bold">Threat level: </fo:inline>Low</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Description:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">A description of the problem.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Technical description:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">Vulnerability described in detail.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Impact:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="5pt">Impact on security.</fo:block>
</fo:block>
<fo:block keep-with-next.within-page="always" font-weight="bold" margin-bottom="5pt">Recommendation:</fo:block><fo:block margin-bottom="8mm">
<fo:block margin-bottom="1.5cm">A ready solution.</fo:block>
</fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="nonFindings">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-style="italic" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2</fo:inline>   Non-Findings</fo:block>
<fo:block margin-bottom="1.5cm">In this section we list some of the things that were tried but turned out
to be dead ends.</fo:block>
<fo:block margin-bottom="1.5cm" id="ftp">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.1</fo:inline>   NF-001 — FTP</fo:block>
<fo:block margin-bottom="5pt">The server was running FTPserver ABC, the most recent version of
this particular piece of software. Anonymous login was
turned off and no relevant vulnerabilities or exploits were
found.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="mail">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.2</fo:inline>   NF-002 — Mail Server</fo:block>
<fo:block margin-bottom="5pt">The server was running Mailserver XYZ, the most recent version of
this particular piece of software. No relevant
vulnerabilities or exploits were found. </fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="sqlInjection">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.3</fo:inline>   NF-003 — SQL Code Injection</fo:block>
<fo:block margin-bottom="5pt">The following parameters are not vulnerable to SQL injection. </fo:block>
<fo:block margin-bottom="5pt">All parameters have been checked manually.</fo:block>
<fo:block border-width="2pt" border-style="double" border-color="black" font-family="LiberationMono" font-size="8pt" color="black" line-height-shift-adjustment="disregard-shifts" margin-bottom="8pt" white-space-collapse="false" linefeed-treatment="preserve" white-space-treatment="preserve" padding="4pt">-file1.php
-file2.php
-file3.php
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="heartbleed">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.4</fo:inline>   NF-004 — Heartbleed</fo:block>
<fo:block margin-bottom="5pt">System was not vulnerable to heartbleed.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="sp2">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="14pt" margin-bottom="0.8cm" background-color="silver"><fo:inline>4.2.5</fo:inline>   NF-005 — Windows XP</fo:block>
<fo:block margin-bottom="1.5cm">The host is running Windows XP. As we all know, Windows XP is
bulletproof.</fo:block>
</fo:block>
</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" id="conclusion">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline>5</fo:inline>   Conclusion</fo:block>
<fo:block margin-bottom="5pt">In the course of this penetration test, we have demonstrated that the
FishInABarrel Web Application faces a range of security issues which makes
it vulnerable to a number of different attacks. Vulnerabilities found
included: cross-site scripting (both stored and reflected), cross-site
request forgery, information disclosure and lack of brute force
protection.</fo:block>
<fo:block margin-bottom="5pt">Our conclusion is that there are a number of things that FishInABarrel BV has to
fix before Sitting Duck should use their software. A number of the security
issues highlighted in this report have fairly simple solutions, but these
should nevertheless be fixed before use of the FishInABarrel Web App
continues.</fo:block>
<fo:block margin-bottom="1.5cm">We finally want to emphasize that security is a process and this penetration
test is just a one-time snapshot. Security posture must be continuously
evaluated and improved. Regular audits and ongoing improvements are
essential in order to maintain control of your corporate information
security. We hope that this pentest report (and the detailed explanations of
our findings) will contribute meaningfully towards that end. Don't hesitate
to let us know if you have any further questions or need further
clarification of anything in this report.</fo:block>
</fo:block>
<fo:block margin-bottom="1.5cm" break-before="page" id="testteam">
<fo:block keep-with-next.within-page="always" font-weight="bold" font-size="16pt" margin-bottom="1cm" background-color="orange"><fo:inline> Appendix 1</fo:inline>   Testing team</fo:block>
<fo:block xmlns:svg="http://www.w3.org/2000/svg"><fo:table border-width="1pt" border-style="solid" border-color="black" width="100%" table-layout="fixed"><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(25)"/><fo:table-column border-width="1pt" border-style="solid" border-color="black" column-width="proportional-column-width(75)"/><fo:table-body><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Aristotle</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Greek philosopher and scientist born in the Macedonian city of Stagira, Chalkidice, on the northern periphery of Classical Greece.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>George Boole</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>English mathematician, philosopher and logician. Works in the fields of differential equations and algebraic logic, and is now best known as the author of The Laws of Thought.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>William of Ockham</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>English Franciscan friar and scholastic philosopher and theologian. Considered to be one of the major figures of medieval thought. At the centre of some major intellectual and political controversies.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Ludwig Josef Johann Wittgenstein</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Austrian-British philosopher who works primarily in logic, the philosophy of mathematics, the philosophy of mind, and the philosophy of language.</fo:block></fo:table-cell></fo:table-row><fo:table-row border-width="1pt" border-style="solid" border-color="black"><fo:table-cell padding="2pt"><fo:block>Melanie Rieback</fo:block></fo:table-cell><fo:table-cell padding="2pt"><fo:block>Melanie Rieback is a former Asst. Prof. of Computer Science from the VU,
who is also the co-founder/CEO of Radically Open Security.</fo:block></fo:table-cell></fo:table-row></fo:table-body></fo:table></fo:block>
</fo:block>
</fo:block><fo:block id="EndOfDoc"/></fo:flow></fo:page-sequence></fo:root>