Files
HacktivityLabSheets/_labs/web_security/7_additional_web.md
Z. Cliffe Schreuders 85a169a391 Enhance documentation and formatting guidelines
- Added heading formatting rules to the highlighting guide, specifying the removal of bold formatting and preservation of anchor links.
- Updated authors for the C and Assembly Language lab to include Tom Shaw and Z. Cliffe Schreuders.
- Introduced PHP language support in the hacktivity theme CSS for improved code block labeling.
2025-10-02 23:01:16 +01:00

5.0 KiB

title, author, license, description, overview, tags, categories, lab_sheet_url, type, cybok
title author license description overview tags categories lab_sheet_url type cybok
Web Security: Additional Challenges
Thalita Vergilio
Z. Cliffe Schreuders
Andrew Scholey
CC BY-SA 4.0 Complete additional web security challenges using Security Shepherd platform, focusing on cryptographic storage vulnerabilities and unvalidated redirects. In this web security lab, you will work through additional challenges using the Security Shepherd platform. These challenges focus on cryptographic storage vulnerabilities and unvalidated redirects, providing hands-on experience with real-world web security issues. You'll learn to identify and exploit insecure cryptographic implementations and understand the risks associated with unvalidated redirects and forwards in web applications.
web-security
cryptographic-storage
redirects
security-shepherd
ctf
web_security
https://docs.google.com/document/d/1DDjyBGtB9vaFD6S2s1jQn7_bpVn4UlK-njbmVX5_UiM/edit?usp=sharing
lab-environment
ctf-lab
ka topic keywords
WAM Fundamental Concepts and Approaches
web PKI and HTTPS
authentication
ACCESS CONTROL
cookies
passwords and alternatives
JAVASCRIPT
HYPERTEXT MARKUP LANGUAGE (HTML)
CASCADING STYLE SHEETS (CSS)
HYPERTEXT TRANSFER PROTOCOL (HTTP)
HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
DATABASE
Broken Access Control / Insecure Direct Object References
SESSION HIJACKING
CERTIFICATES
REPRESENTATIONAL STATE TRANSFER (REST)
PERMISSION DIALOG BASED ACCESS CONTROL
CLIENT-SERVER MODELS
ka topic keywords
WAM Client-Side Vulnerabilities and Mitigations
client-side storage
CLIENT-SIDE VALIDATION
clickjacking
ka topic keywords
WAM Server-Side Vulnerabilities and Mitigations
injection vulnerabilities
server-side misconfiguration and vulnerable components
CROSS-SITE SCRIPTING (XSS)
SAME ORIGIN POLICY (SOP)
COMMAND INJECTION
SQL-INJECTION
CROSS-SITE REQUEST FORGERY (CSRF)
CONFUSED DEPUTY ATTACKS
BACK-END
BLIND ATTACKS
ka topic keywords
SS Categories of Vulnerabilities
Web vulnerabilities / OWASP Top 10
API vulnerabilities
ka topic keywords
SS Prevention of Vulnerabilities
coding practices
Protecting against session management attacks, XSS, SQLi, CSRF
API design
ka topic keywords
SS Detection of Vulnerabilities
dynamic detection

General notes about the labs

Often the lab instructions are intentionally open-ended, and you will have to figure some things out for yourselves. This module is designed to be challenging, as well as fun!

However, we aim to provide a well planned and fluent experience. If you notice any mistakes in the lab instructions or you feel some important information is missing, please let us know and we will try to address any issues.

Preparation

Action: Start by logging into Hacktivity.

Click here for a guide to using Hacktivity. This includes some important information about how to use the lab environment and how to troubleshoot during lab exercises. If you haven't already, have a read through.

Log into Security Shepherd and work through assessed tasks

For this week's Security Shepherd Challenges you need to use the 'Additional Web Challenges' VMs on Hacktivity.

Note: Remember the login details for the Kali VM is Kali/Kali.

You have the lesson and challenges to complete for:

  • 3 x Insecure Cryptographic Storage
  • 1 x Unvalidated Redirects and Forwards (Lesson)

Hint: The tips below are optional. Try to complete the challenges without them if you can.

Insecure Cryptographic Storage Challenge 2 Tips

Hint: You may want to use an online decoder for the Vigenere Cipher. Can you find the String and the key to use?

Insecure Cryptographic Storage Challenge 3 Tips

Hint: The encryption/decryption happens server-side, so you need to experiment with re-sending the request to decrypt. One of the letters of the alphabet, when used repeatedly, will translate into the key you need.

Conclusion

At this point you have:

  • Learned about cryptographic storage vulnerabilities and how to identify insecure implementations

  • Gained experience with various cryptographic attacks including cipher analysis and key recovery

  • Understood the risks associated with unvalidated redirects and forwards in web applications

  • Completed additional web security challenges using the Security Shepherd platform

Congratulations! These additional challenges have provided you with hands-on experience in identifying and exploiting cryptographic vulnerabilities, as well as understanding the security implications of unvalidated redirects in web applications.