Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Cookie: amCreditOffer=CardType=Gold&Limit=10000&Interest=7.9; amSessionId=422427664; ASP.NET_SessionId=42g5
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Host: demo.testfire.net
Referer: https://demo.testfire.net/bank/transaction.aspx
Content-Type: application/x-www-form-urlencoded
Accept-Language: en-US
Content-Length: 80
__VIEWSTATE=%2FwEPDwUKMTYzNDg3OTA4NmRk&after=1234&before=1234%27+having+1%3D1--+
<h2>Summary:</h2>
<p><b><span id="_ctl0_Content_lblSummary">Syntax error in string in query expression '1=1 and t.trans_date >= 1
</span></b></p>
<h2>Error Message:</h2>
</div>
</div>
<div class="disclaimer">
The Altoro Mutual website is published by Watchfire, Inc. for the sole purpose of
<div id="footer" style="width: 99%;">
<a id="_ctl0_HyperLink5" href="../default.aspx?content=privacy.htm">Privacy Policy</a>
|
<a id="_ctl0_HyperLink6" href="../default.aspx?content=security.htm">Security Statement</a>
|
© 2016 Altoro Mutual, Inc.
<div class="disclaimer">
The Altoro Mutual website is published by Watchfire, Inc. for the sole purpose of
demonstrating the effectiveness of Watchfire products in detecting web application
vulnerabilities and website defects. This site is not a real banking site. Similarities,
if any, to third party products and/or websites are purely coincidental. This site is
provided "as is" without warranty of any kind, either express or implied. Watchfire does
not assume any risk in relation to your use of this website. For additional Terms of Use,
please go to <a id="_ctl0_HyperLink7" href="http://www.watchfire.com/statements/terms.aspx">http://www.wat
Answer: True
Request / Response
POST /bank/transaction.aspx HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Cookie: amCreditOffer=CardType=Gold&Limit=10000&Interest=7.9; amSessionId=422427664; ASP.NET_SessionId=42g5hu
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Host: demo.testfire.net
Referer: https://demo.testfire.net/bank/transaction.aspx
Content-Type: application/x-www-form-urlencoded
Accept-Language: en-US
Content-Length: 80
__VIEWSTATE=%2FwEPDwUKMTYzNDg3OTA4NmRk&after=1234&before=1234%27+having+1%3D1--+
<h2>Summary:</h2>
<p><b><span id="_ctl0_Content_lblSummary">Syntax error in string in query expression '1=1 and t.trans_date >= 123
</span></b></p>
<h2>Error Message:</h2>
</div>
</div>
<div class="disclaimer">
The Altoro Mutual website is published by Watchfire, Inc. for the sole purpose of
<div id="footer" style="width: 99%;">
<a id="_ctl0_HyperLink5" href="../default.aspx?content=privacy.htm">Privacy Policy</a>
|
<a id="_ctl0_HyperLink6" href="../default.aspx?content=security.htm">Security Statement</a>
|
© 2016 Altoro Mutual, Inc.
<div class="disclaimer">
The Altoro Mutual website is published by Watchfire, Inc. for the sole purpose of
demonstrating the effectiveness of Watchfire products in detecting web application
vulnerabilities and website defects. This site is not a real banking site. Similarities,
if any, to third party products and/or websites are purely coincidental. This site is
provided "as is" without warranty of any kind, either express or implied. Watchfire does
not assume any risk in relation to your use of this website. For additional Terms of Use,
please go to <a id="_ctl0_HyperLink7" href="http://www.watchfire.com/statements/terms.aspx">http://www.watchfi
HTTP/1.1 200 OK
Content-Length: 5726
Server: Microsoft-IIS/8.0
X-AspNet-Version: 2.0.50727
Set-Cookie: lang=international
X-Powered-By: ASP.NET
SecondAppScanHeader: whatever; path=/
Date: Mon, 12 Sep 2016 08:30:56 GMT
Content-Type: text/html; charset=utf-8
Cache-Control: private
<html>
<head>
<title>Altoro Mutual: Link Disclaimer</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css">
<!--
p { font: 12px verdana, arial, sans-serif; color:#000000; line-height:1.6 }
-->
</style>
<script>
function go(sDestination) {
window.opener.location.href = sDestination;
cl();
}
function cl() {
window.close();
}
<center>
<table width=90% border=0>
<tr>
<td>
<p>This hyperlink allows you to access a third party website:
<br /><br />
<b><script>document.write(unescape(sDst));</script></b>
<br /><br />
Please read the privacy policy of the linked website, which
may differ from the privacy policy of the Altoro Mutual website.
<br /><br />
Click OK to continue or Cancel to remain on altoromutual.com.
</p>
<td>
<p>This hyperlink allows you to access a third party website:
<br /><br />
<b><script>document.write(unescape(sDst));</script></b>
<br /><br />
Please read the privacy policy of the linked website, which
may differ from the privacy policy of the Altoro Mutual website.
<br /><br />
Click OK to continue or Cancel to remain on altoromutual.com.
</p>
<a href="#" onclick="go(sDst);return false;"><img src="images/ok.gif" id="ok" alt="ok" border="0"></a>
<a href="#" onclick="cl();return false;"><img src="images/cancel.gif" id="cancel" alt="cancel" border="0"></a>
</td>
</tr>
</table>
</center>
</body>
</html>
Please identify the vulnerability from the request and response, and then write down the answer. Also, please id
Vulnerability
Request / Response
GET /disclaimer.htm HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Cookie: amCreditOffer=CardType=Gold&Limit=10000&Interest=7.9; ASP.NET_SessionId=yuka3uj4yfvsoxbzknebsfax; amSe
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Host: demo.testfire.net
Referer: https://demo.testfire.net/bank/customize.aspx
Accept-Language: en-US
HTTP/1.1 200 OK
Content-Length: 5726
Server: Microsoft-IIS/8.0
X-AspNet-Version: 2.0.50727
Set-Cookie: lang=international
X-Powered-By: ASP.NET
SecondAppScanHeader: whatever; path=/
Date: Mon, 12 Sep 2016 08:30:56 GMT
Content-Type: text/html; charset=utf-8
Cache-Control: private
<html>
<head>
<title>Altoro Mutual: Link Disclaimer</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css">
<!--
p { font: 12px verdana, arial, sans-serif; color:#000000; line-height:1.6 }
-->
</style>
<script>
function go(sDestination) {
window.opener.location.href = sDestination;
cl();
}
function cl() {
window.close();
}
<center>
<table width=90% border=0>
<tr>
<td>
<p>This hyperlink allows you to access a third party website:
<br /><br />
<b><script>document.write(unescape(sDst));</script></b>
<br /><br />
Please read the privacy policy of the linked website, which
may differ from the privacy policy of the Altoro Mutual website.
<br /><br />
Click OK to continue or Cancel to remain on altoromutual.com.
</p>
<td>
<p>This hyperlink allows you to access a third party website:
<br /><br />
<b><script>document.write(unescape(sDst));</script></b>
<br /><br />
Please read the privacy policy of the linked website, which
may differ from the privacy policy of the Altoro Mutual website.
<br /><br />
Click OK to continue or Cancel to remain on altoromutual.com.
</p>
<a href="#" onclick="go(sDst);return false;"><img src="images/ok.gif" id="ok" alt="ok" border="0"></a>
<a href="#" onclick="cl();return false;"><img src="images/cancel.gif" id="cancel" alt="cancel" border="0"></a>
</td>
</tr>
</table>
</center>
</body>
</html>
ord=RGVtbzEyMzQ=; lang=
The following questions are related to web application scanner such as IBM AppScan. Please write down the answ
QA - 01
Question
How do you prepare test cases before you run web application vulnerability scanner?
Answer
before we scan the web application for any vulnerabilities firstly we need to have written approval from the clien
which includes what has to be scanned an
QA - 02
Question
Answer
QA - 03
Question
Answer
We can check it on the status if the scan is still running we see the status as running if completed it displays as co