Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changes to templates that better accomodate Pen Test report writing #521

Draft
wants to merge 10 commits into
base: master
Choose a base branch
from
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview of the Vulnerability

Application-level denial of service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.
Application-level Denial of Service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.

There is a local application-level DoS vulnerability within this Android application that causes it to crash. An attacker can use this vulnerability to provide empty, malformed, or irregular data via the Intent binding mechanism, crashing the application and making it unavailable for its designed purpose to legitimate users.

Expand All @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand All @@ -21,10 +21,10 @@ Application-level DoS can result in indirect financial loss for the business thr

{{parameter}}

1. Observe that the payload causes a denial of service
1. Observe that the payload causes a Denial of Service

## Proof of Concept (PoC)

The screenshot below demonstrates the denial of service:
The screenshot below demonstrates the Denial of Service:

{{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview of the Vulnerability

Application-level denial of service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.
Application-level Denial of Service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.

There is a local application-level DoS vulnerability within this iOS application that causes it to crash. An attacker can use this vulnerability to provide empty, malformed, or irregular data via a URL scheme, crashing the application and making it unavailable for its designed purpose to legitimate users.

Expand All @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand All @@ -21,10 +21,10 @@ Application-level DoS can result in indirect financial loss for the business thr

{{parameter}}

1. Observe that the payload causes a denial of service
1. Observe that the payload causes a Denial of Service

## Proof of Concept (PoC)

The screenshot below demonstrates the denial of service:
The screenshot below demonstrates the Denial of Service:

{{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview of the Vulnerability

Application-level denial of service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.
Application-level Denial of Service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.

There is an application-level DoS vulnerability within this iOS or Android application that causes it to crash. An attacker can use this vulnerability to exhaust resources, making the application unavailable for its designed purpose to legitimate users.

Expand All @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand All @@ -21,10 +21,10 @@ Application-level DoS can result in indirect financial loss for the business thr

{{parameter}}

1. Observe that the payload causes a denial of service that has high impact or medium difficulty to be performed
1. Observe that the payload causes a Denial of Service that has high impact or medium difficulty to be performed

## Proof of Concept (PoC)

The screenshot below demonstrates the denial of service:
The screenshot below demonstrates the Denial of Service:

{{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Application-level DoS can result in indirect financial loss for the business thr

{{parameter}}

1. Observe that the payload causes a denial of service that has critical impact or is easy to perform
1. Observe that the payload causes a Denial of Service that has critical impact or is easy to perform

## Proof of Concept (PoC)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,10 +21,10 @@ Application-level DoS can result in indirect financial loss for the business thr

{{parameter}}

1. Observe that the payload causes a denial of service that has high impact or medium difficulty to be performed
1. Observe that the payload causes a Denial of Service that has high impact or medium difficulty to be performed

## Proof of Concept (PoC)

The screenshot below demonstrates proof of the vulnerability:
The screenshot below demonstrates the Denial of Service:

{{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview of the Vulnerability

Application-level denial of service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.
Application-level Denial of Service (DoS) attacks are designed to deny service to users of an application by flooding it with many HTTP requests. This makes it impossible for the server to respond to legitimate requests in any practical time frame.

There is an application-level DoS vulnerability within this application that an attacker can use to exhaust resources, making the application unavailable for its designed purpose to legitimate users.

Expand All @@ -12,7 +12,7 @@ Application-level DoS can result in indirect financial loss for the business thr

## Steps to Reproduce

1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Use the following payload:

{{payload}}
Expand All @@ -21,10 +21,10 @@ Application-level DoS can result in indirect financial loss for the business thr

{{parameter}}

1. Observe that the payload causes a denial of service
1. Observe that the payload causes a Denial of Service

## Proof of Concept (PoC)

The screenshot below demonstrates the denial of service:
The screenshot below demonstrates the Denial of Service:

{{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ IDOR can lead to reputational damage for the business through the impact to cust
1. Use a browser to navigate to: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}
>
> {{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
>
> {{screenshot}}

## Proof of Concept (PoC)

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

A malicious attacker could leverage this IDOR vulnerability to read data by using the following payload:

Expand All @@ -33,5 +33,5 @@ A malicious attacker could leverage this IDOR vulnerability to read data by usin
```

The following screenshot(s) demonstrate(s) this additional impact:

{{screenshot}}
>
> {{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ IDOR can result in reputational damage for the business through the impact to cu
1. Use a browser to navigate to: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}
>
> {{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
>
> {{screenshot}}

## Proof of Concept (PoC)

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

An attacker could leverage this IDOR vulnerability to extract data by using the following payload:

Expand All @@ -33,5 +33,5 @@ An attacker could leverage this IDOR vulnerability to extract data by using the
```

The following screenshot(s) demonstrate(s) this vulnerability:

{{screenshot}}
>
> {{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ IDOR can lead to reputational damage for the business through the impact to cust
1. Use a browser to navigate to: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}
>
> {{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
>
> {{screenshot}}

## Proof of Concept (PoC)

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

A malicious attacker could leverage this IDOR vulnerability to extract data by using the following payload:

Expand All @@ -33,5 +33,5 @@ A malicious attacker could leverage this IDOR vulnerability to extract data by u
```

The following screenshot(s) demonstrate(s) this additional impact:

{{screenshot}}
>
> {{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ IDOR can lead to reputational damage for the business through the impact to cust
1. Use a browser to navigate to: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}
>
> {{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
>
> {{screenshot}}

## Proof of Concept (PoC)

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

A malicious attacker could leverage this IDOR vulnerability to read PII by using the following payload:

Expand All @@ -33,5 +33,5 @@ A malicious attacker could leverage this IDOR vulnerability to read PII by using
```

The following screenshot(s) demonstrate(s) this additional impact:

{{screenshot}}
>
> {{screenshot}}
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ IDOR can lead to reputational damage for the business through the impact to cust
1. Use a browser to navigate to: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}
>
> {{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
>
> {{screenshot}}

## Proof of Concept (PoC)

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

A malicious attacker could leverage this IDOR vulnerability to read data by using the following payload:

Expand All @@ -33,5 +33,5 @@ A malicious attacker could leverage this IDOR vulnerability to read data by usin
```

The following screenshot(s) demonstrate(s) this additional impact:

{{screenshot}}
>
> {{screenshot}}
12 changes: 6 additions & 6 deletions submissions/description/broken_access_control/idor/template.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,18 +13,18 @@ IDOR can lead to indirect financial loss through an attacker accessing, deleting
1. Use a browser to navigate to: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}
>
> {{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
>
> {{screenshot}}

## Proof of Concept (PoC)

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

A malicious attacker could leverage this IDOR vulnerability to extract data by using the following payload:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Overview of the Vulnerability

A Pseudo-Random Number Generator (PRNG) uses an initial seed value to generate random number through a complex algorithm. When this seed value is small in size, it is possible to bruteforce all possible seeed values. An attacker who can guess the seed value can predict or guess the random numbers generated by the PRNG. This can lead to unauthorized access if that seed value is used for authorization and authentication.
A Pseudo-Random Number Generator (PRNG) uses an initial seed value to generate random number through a complex algorithm. When this seed value is small in size, it is possible to bruteforce all possible seed values. An attacker who can guess the seed value can predict or guess the random numbers generated by the PRNG. This can lead to unauthorized access if that seed value is used for authorization and authentication.

## Business Impact

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This vulnerability can lead to reputational damage for the business due to a los

1. Utilize some software that allows computer memory to be accessed in a human-readable format
1. Log in to the application
1. Navigate to {{url}} and perform {{action}}
1. Navigate to the following URL: {{url}} and perform {{action}}
1. Cease using the application
1. Using the computer memory viewer, view the password of the user that remained in memory after use

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This vulnerability can lead to reputational damage and indirect financial loss t

1. Login to the application and input data so that it is stored by the application
1. Navigate to where the application stores the gathered information
1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Observe the application data that is stored unencrypted

## Proof of Concept (PoC)
Expand Down
2 changes: 1 addition & 1 deletion submissions/description/insecure_data_storage/template.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This vulnerability can lead to reputational damage and indirect financial loss t

1. Login to the application and input data so that it is stored by the application
1. Navigate to where the application stores the gathered information
1. Navigate to {{url}}
1. Navigate to the following URL: {{url}}
1. Observe the application data that is stored unencrypted

## Proof of Concept (PoC)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ When Operating System (OS) firmware is insecure, it broadens the application’s

## Business Impact

This vulnerability can lead to direct financial loss to the company due to data theft, application manipulation and corruption, or denial of service to customers and users of the application. It can also lead to reputational damage as customers may view the application as insecure.
This vulnerability can lead to direct financial loss to the company due to data theft, application manipulation and corruption, or Denial of Service to customers and users of the application. It can also lead to reputational damage as customers may view the application as insecure.

## Steps to Reproduce

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ A hard-coded password for a non-privileged user was identified in the source cod

## Business Impact

This vulnerability can lead to direct financial loss to the company due to data theft, application manipulation and corruption, or denial of service to customers and users of the application. It can also lead to reputational damage as customers may view the application as insecure.
This vulnerability can lead to direct financial loss to the company due to data theft, application manipulation and corruption, or Denial of Service to customers and users of the application. It can also lead to reputational damage as customers may view the application as insecure.

## Steps to Reproduce

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ A hard-coded password for a privileged user was identified in the source code of

## Business Impact

This vulnerability can lead to direct financial loss to the company due to data theft, application manipulation and corruption, or denial of service to customers and users of the application. It can also lead to reputational damage as customers may view the application as insecure.
This vulnerability can lead to direct financial loss to the company due to data theft, application manipulation and corruption, or Denial of Service to customers and users of the application. It can also lead to reputational damage as customers may view the application as insecure.

## Steps to Reproduce

Expand Down
Loading
Loading