Security Audit Report Jail
Security Audit Report Jail
Highly Confidential
©
All rights reserved to Sandrock eSecurities Pvt. Ltd., 2017
No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved to its copyright owner,
including photocopying and all other copying, any transfer or transmission using any network or other means of communication, any
broadcast for distant learning, in any form or by any means such as any information storage, transmission or retrieval system, without
prior written permission from Sandrock eSecurities.
1 INTRODUCTION ........................................................................................... 3
2
Confidential
1 Introduction
A security vulnerability assessment identifies and reports noted vulnerabilities in the web
application, followed by a penetration test which attempts to exploit the vulnerabilities to
determine whether unauthorized access or other malicious activity is possible.
1.1 Objective
Black box testing of the application includes, identifying and collecting all the possible
application security vulnerabilities, from the front end of the application. This type of
testing is suitable for all internal and business applications.
Sandrock eSecurities was tasked with following methodical approach in obtaining access
to the objective goals.
1. Information Gathering
• Looking for information on publicly available resources
• Inserting technical information provided by the organization
• Non-intrusive scan to determine systems, servers and services
2. Planning and Analysis
• Analyzing the possible risks and vulnerabilities
• Planning for a High Level Intense Penetration Test
• Designing the overall testing approach
3. Vulnerability Detection and Identification
• Searching for vulnerabilities on the resources
• Enumerating known flaws, loopholes and mis-configurations
• Manually probing the target, looking for vulnerabilities
4. Attack or Active Penetration
• Customizing and using readymade exploits for a few known vulnerabilities
• Building exploits for uncommon specific security loophole
• Testing the exploits against vulnerabilities
• Escalating the privileges to exploit higher roles, systems and services
5. Reporting
• Executive Report for Top Management
• Comprehensive Technical Report for Technical Personnel with solutions
This report can be used to support the regulatory and compliance requirements of:
• CERT-IN
• ISO 27001 ISMS
• PCI-DSS
• HIPAA
• GLBA
3
Confidential
2 Executive Summary
A vulnerability assessment and penetration test was performed on the web application.
Sandrock eSecurities was tasked with performing the security test toward the following:
• http://demosl56.rvsolutions.in/ernet/website-069/
4
Confidential
2.4.1.3 Server Version Disclosure: Passed
Server does not disclose the web server version information
5
Confidential
2.4.1.6 XSS Protection: Passed
Server responds with “X-XSS-Protection” header
7
Confidential
2.4.2 User Authentication
8
Confidential
2.4.2.2 Default/Guessable Username: Passed
Drupal default username “admin” is blocked in the application.
9
Confidential
2.4.3 Session Management
10
Confidential
2.4.3.3 Cross Site Request Forgery: Passed
Application is able to defend against CSRF attacks.
11
Confidential