Cryptographic Failure
this lab covers a lot of basic cwes like CWE-327, CWE-759, CWE-916, CWE-319, CWE-523
Last updated
this lab covers a lot of basic cwes like CWE-327, CWE-759, CWE-916, CWE-319, CWE-523
Last updated
To better understand Cryptographic Failures, I will walk you through the Cryptographic Failures module in TryHackMe’s OWASP Top 10 room. In this scenario, we will analyze a vulnerable "Sense and Sensitivity" website.
View the source code of the login page.
The developer has left a comment revealing that the database is stored in the
/assets
directory.
There is, in fact, a web application database (webapp.db) stored in the /assets directory. Databases stored as files are known as ‘flat-file’ databases.
Click on the file to download it.
Determine the file type.
The database is a SQlite database
Dump the database
Dump the tables.
Dump users.
We now have access to usernames and password hashes. Following the order, the second column contains the usernames, and the third column contains the password hashes.
Crack the hash using CrackStation.
The hash has been identified as an MD5 hash and successfully cracked to reveal the plaintext password ‘qwertyuiop’.
Navigate back to the login page and use the credentials.
We now have admin access and can perform actions, including adding and deleting users.
Cryptographic flaws, including the use of weak algorithms such as MD5, coupled with data exposure, can result in the compromise of sensitive information and systems.