0% found this document useful (0 votes)
83 views

Security Audit Report Jail

Uploaded by

Mridul Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views

Security Audit Report Jail

Uploaded by

Mridul Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Security Audit Report

Madhya Pradesh Jail


Government of Madhya Pradesh

Highly Confidential

©
All rights reserved to Sandrock eSecurities Pvt. Ltd., 2017

No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved to its copyright owner,
including photocopying and all other copying, any transfer or transmission using any network or other means of communication, any
broadcast for distant learning, in any form or by any means such as any information storage, transmission or retrieval system, without
prior written permission from Sandrock eSecurities.
1 INTRODUCTION ........................................................................................... 3

1.1 OBJECTIVE ................................................................................................. 3


1.1.1 Application Black Box Penetration Testing ................................................. 3
1.2 TESTING METHODOLOGY ................................................................................. 3
1.3 REPORT AND COMPLIANCE ............................................................................... 3
2 EXECUTIVE SUMMARY .................................................................................. 4

2.1 SCOPE OF ACTIVITY ....................................................................................... 4


2.2 VULNERABILITIES’ CRITICALITY SUMMARY ............................................................. 4
2.3 VULNERABILITIES’ TECHNICAL SUMMARY .............................................................. 4
2.4 TEST CASE’ ARTIFACTS/SCREENSHOTS ................................................................ 4
2.4.1 Server Misconfiguration .......................................................................... 4
2.4.1.1 CMS is updated: Failed ................................................................................ 4
2.4.1.2 CMS Modules/Plugins/Addons updated: Failed................................................. 4
2.4.1.3 Server Version Disclosure: Passed ................................................................. 5
2.4.1.4 Application Framework Version Disclosure: Passed .......................................... 5
2.4.1.5 Clickjacking (X-Frame-Options): Passed ......................................................... 5
2.4.1.6 XSS Protection: Passed ................................................................................ 6
2.4.1.7 MIME Sniffing: Passed ................................................................................. 6
2.4.1.8 Cache Poisoning: Passed .............................................................................. 6
2.4.1.9 Cross Origin Resource Sharing: Passed .......................................................... 7
2.4.1.10 Other Miscellaneous Server/Application Information Disclosure: Passed ............. 7
2.4.1.11 Errors and Exceptions: Passed ...................................................................... 7
2.4.2 User Authentication ................................................................................ 8
2.4.2.1 Default/Guessable Admin Login URL: Passed .................................................. 8
2.4.2.2 Default/Guessable Username: Passed ............................................................ 9
2.4.2.3 User Self Registration: Passed ...................................................................... 9
2.4.2.4 Encrypted Credentials Submission: Failed....................................................... 9
2.4.2.5 Strong Password Policy: Passed .................................................................... 9
2.4.3 Session Management ............................................................................ 10
2.4.3.1 Session Expiration: Passed ......................................................................... 10
2.4.3.2 Concurrent Sessions: Passed ...................................................................... 10
2.4.3.3 Cross Site Request Forgery: Passed ............................................................. 11

2
Confidential
1 Introduction
A security vulnerability assessment identifies and reports noted vulnerabilities in the web
application, followed by a penetration test which attempts to exploit the vulnerabilities to
determine whether unauthorized access or other malicious activity is possible.

1.1 Objective

1.1.1 Application Black Box Penetration Testing

Black box testing of the application includes, identifying and collecting all the possible
application security vulnerabilities, from the front end of the application. This type of
testing is suitable for all internal and business applications.

1.2 Testing Methodology

Sandrock eSecurities was tasked with following methodical approach in obtaining access
to the objective goals.

1. Information Gathering
• Looking for information on publicly available resources
• Inserting technical information provided by the organization
• Non-intrusive scan to determine systems, servers and services
2. Planning and Analysis
• Analyzing the possible risks and vulnerabilities
• Planning for a High Level Intense Penetration Test
• Designing the overall testing approach
3. Vulnerability Detection and Identification
• Searching for vulnerabilities on the resources
• Enumerating known flaws, loopholes and mis-configurations
• Manually probing the target, looking for vulnerabilities
4. Attack or Active Penetration
• Customizing and using readymade exploits for a few known vulnerabilities
• Building exploits for uncommon specific security loophole
• Testing the exploits against vulnerabilities
• Escalating the privileges to exploit higher roles, systems and services
5. Reporting
• Executive Report for Top Management
• Comprehensive Technical Report for Technical Personnel with solutions

1.3 Report and Compliance

The penetration testing report includes the following sections:

• Overall High-Level Summary and Recommendations (non-technical)


• Methodology walkthrough and detailed outline of steps taken
• Each finding with included screenshots, walkthrough, sample code, etc
• Any additional items that were not included

This report can be used to support the regulatory and compliance requirements of:
• CERT-IN
• ISO 27001 ISMS
• PCI-DSS
• HIPAA
• GLBA

3
Confidential
2 Executive Summary
A vulnerability assessment and penetration test was performed on the web application.

Date of Penetration Test: 24th August – 25th August 2017


Number of Technical Personnel Involved: 1

2.1 Scope of Activity

Sandrock eSecurities was tasked with performing the security test toward the following:
• http://demosl56.rvsolutions.in/ernet/website-069/

2.2 Vulnerabilities’ Criticality Summary

Total Critical High Medium Low Remarks

3 0 2 1 0 Scan 1 -C:0, H:2, M:1, L:0

2.3 Vulnerabilities’ Technical Summary

S# Vulnerability Description Status Rating


1 CMS is updated CMS is not fully updated Update CMS High
CMS
CMS modules are not
2 Modules/Plugins/Add Update CMS plugins Medium
fully updated
ons updated
Encrypted Application submits the
3 Credentials user login password in Implement SSL/ High
Submission unencrypted form.

2.4 Test Case’ Artifacts/Screenshots

2.4.1 Server Misconfiguration

2.4.1.1 CMS is updated: Failed


CMS is not fully updated.

2.4.1.2 CMS Modules/Plugins/Addons updated: Failed


CMS modules are not fully updated.

4
Confidential
2.4.1.3 Server Version Disclosure: Passed
Server does not disclose the web server version information

2.4.1.4 Application Framework Version Disclosure: Passed


Application does not disclose the application framework version information

2.4.1.5 Clickjacking (X-Frame-Options): Passed


Server responds with “X-Frame-Options: SAMEORIGIN” header

5
Confidential
2.4.1.6 XSS Protection: Passed
Server responds with “X-XSS-Protection” header

2.4.1.7 MIME Sniffing: Passed


Server responds with “X-Content-Type-Options: nosniff” header

2.4.1.8 Cache Poisoning: Passed


Server does not respond with “Cache-Control” header
6
Confidential
2.4.1.9 Cross Origin Resource Sharing: Passed
Application does not allow all origins (*) for resource sharing, as the server does not
respond with “Access-Control-Allow-Origin” header

2.4.1.10 Other Miscellaneous Server/Application Information Disclosure: Passed


Application does not reveal the CMS in the HTTP Source Code.

2.4.1.11 Errors and Exceptions: Passed


Generic errors and messages are displayed to users, application does not reveal
technical information in errors.

7
Confidential
2.4.2 User Authentication

2.4.2.1 Default/Guessable Admin Login URL: Passed


Application uses a custom user login location, instead of Drupal default user location
“/user/login”.

8
Confidential
2.4.2.2 Default/Guessable Username: Passed
Drupal default username “admin” is blocked in the application.

2.4.2.3 User Self Registration: Passed


Application does not allow visitors to register themselves.

2.4.2.4 Encrypted Credentials Submission: Failed


Application submits the user login password in unencrypted form.
Fix: Please implement SSL.

2.4.2.5 Strong Password Policy: Passed


Application has configured strong password policy.

9
Confidential
2.4.3 Session Management

2.4.3.1 Session Expiration: Passed


Application expires the session cookies after a pre-defined timeframe.

2.4.3.2 Concurrent Sessions: Passed


Application does not allow more than 1 active session.

10
Confidential
2.4.3.3 Cross Site Request Forgery: Passed
Application is able to defend against CSRF attacks.

11
Confidential

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy