Skip main navigation

Exploitation

In this video, you will learn how to exploit authentication-only login using the OWASP Juice Shop.
6.5
Welcome back to Broken Authentication session. In this second part, we will exploit several authentication flaws in our intentionally vulnerable application to get access as admin. We will jump straight to the hands-on exploitation. At the end, we will wrap up exploited issues, which we will discuss in more detail in the third and last part of this session. Let’s hack. Let’s start creating a regular user account.
36.2
Before submitting the request, let’s pop up Developer Tool so that we can monitor the network traffic.
50.2
This would be the sign-up requests, let’s have a look into the request details.
61
The request body includes our account details where we can see our weak passwords.
68.8
We can now log in.
88.7
Next, we will try to recover our one password.
104.4
Again, let’s first pop up Developer Tools.
121.2
While we were typing, several requests were made to the security security-question endpoint. Let’s inspect the last one, which has our complete email address.
138.1
Our email address was sent in the requests, and the server returned our security question.
151.2
How does the server response look for an email address which does not belong to a Juice Shop account?
171.1
This time, the response is empty. Based on these binary responses, we can check whether there’s an admin account.
200.2
Comparing this response with the one we’ve got with our own email address, we know that such account exists and we can try to log in.
220.7
We don’t know the password. But at least we can try to guess it.
230.8
Of course, it’s wrong, but we can do better. Let’s search for common web admin passwords.
258.2
Let’s try the first ones with at least five characters since we saw that this is the minimum required in the sign-up.
286.1
Doing this one-by one will take long, but this is exactly the type of task computers are great at doing.
294.5
The simple bash script does concurrent requests to the login endpoint based on a given email address and the list of passwords. It will stop on a successful log in attempt or at the end of the passwords list.
309.4
Let’s move the passwords list into a text file and do some cleanup.
338.3
It’s time to run our script with Juice Shop admin’s email address and our password list file.
359.2
Two seconds was the time needed to find a password on a simple workstation. Let’s now see whether it really works.
385.4
In fact, it does, and we are now logged in as admin.
394.6
We said it before, and now you have seen it in practice. Although there’s a password strength calculator in the sign-up form, strong password policies are not enforced, allowing five single-class-characters-long passwords. The recover password mechanism can be used as in Oracle to enumerate valid user accounts based on its response. And finally, the login does not implement a lockout feature based on failed login attempts, meaning that we can test as many passwords as we want for a single email address until we get the right one. In our next video, we will discuss what makes the application vulnerable and how to prevent it.

In this video, you will learn how to exploit authentication-only login using the OWASP Juice Shop.

Now that you understand the difference between authorization and authentication, you are ready to follow the demonstration in this video. You will act as the hacker and will exploit the OWASP Juice Shop. What you learn here can be generalized to some other systems and will help you understand how a hacker may test your system.

Reflect and share: Go to OWASP Broken Authentication to see the OWASP table referred to in the video. Read through the additional information provided, and share your findings here.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education