Skip to content

MadlyAbi/N7-Web-Machine-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

2 Commits
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ“‘ Overview This repository contains the detailed penetration testing report for the N7 Web Machine, documenting the methodology, vulnerabilities discovered, exploitation techniques, and remediation recommendations.

๐Ÿ•ต๏ธ Objective The primary goal of this assessment was to identify security weaknesses in the N7 web application and its underlying infrastructure, evaluate their potential impact, and provide actionable mitigation strategies.

๐Ÿ” Scope Target: N7 Web Machine Assessment Type: Black Box Penetration Testing

Tools Used: Nmap for network scanning and service enumeration OWASP ZAP and Burp Suite for web application testing Dirbuster for directory enumeration Hydra for brute-force attacks Metasploit for exploitation Kali Linux as the testing environment

๐Ÿšฆ Methodology The testing approach followed the OWASP Testing Guide and included the following phases: Information Gathering: Identifying open ports, services, and exposed resources. Enumeration: Probing for potential vulnerabilities and weak configurations. Exploitation: Attempting to gain unauthorized access or execute malicious code. Post-Exploitation: Assessing the impact and extracting sensitive data. Reporting: Documenting findings, evidence, and remediation strategies.

๐Ÿ› ๏ธ Exploitation Highlights Vulnerability 1: SQL Injection on the login page Vulnerability 2: Unrestricted File Upload allowing remote code execution Vulnerability 3: Sensitive information exposure via misconfigured directories

๐Ÿ›ก๏ธ Remediation Recommendations Implement input validation and prepared statements to mitigate SQL Injection. Sanitize file uploads and restrict executable file types. Secure directory permissions and avoid exposing sensitive files to the public.

๐Ÿ“ˆ Impact Exploiting these vulnerabilities could lead to: Unauthorized access to sensitive data Server compromise Potential lateral movement within the network

๐Ÿง  Learnings This assessment provided hands-on experience with: Real-world web application vulnerabilities Effective use of penetration testing tools Reporting and documentation of security findings

๐Ÿ“ฌ Contact For any queries or collaboration opportunities, feel free to reach out:

LinkedIn: Abinesh Sri Medium: Abinesh's Cybersecurity Blog Email: abineshsri72@gmail.com

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors