Klurifixus / TheCornerForum

0 stars 1 forks source link

Security Testing #56

Open Klurifixus opened 11 months ago

Klurifixus commented 11 months ago
  1. SQL Injection and XSS: Ensure inputs are sanitized to prevent malicious attacks.

  2. Permission Checks: Verify that unauthorized users cannot access restricted functionalities.

Klurifixus commented 11 months ago

The output from SQLMap indicates a few important things:

No Injectables Found: SQLMap did not find any SQL injection vulnerabilities in the URI parameter it tested. This is a positive sign, but it's not a guarantee that your application is completely safe from SQL injection. It could also mean that the particular parameter or URL you tested is not vulnerable.

No Dynamic Parameters Detected: SQLMap noted that the URI parameter '#1*' does not appear to be dynamic. This might indicate that the parameter is not influenced by user input or does not change in response to different inputs.

HTTP 404 Errors: A significant number of HTTP 404 (Not Found) errors were encountered. This suggests that either the URLs being tested by SQLMap don't exist on your server or that SQLMap is trying to access URLs that aren't valid.

Recommendations by SQLMap:

Increasing '--level'/'--risk' Options: To conduct a more thorough test, you could increase the --level and --risk settings. These options control the types and intensities of tests SQLMap performs. Using '--tamper' Option: If you suspect some form of Web Application Firewall (WAF) or protection mechanism that might be interfering with the tests, the --tamper option can help bypass these protections. Switching '--random-agent': Using different user agents can sometimes bypass basic security filters that block known penetration testing tools. ISSUE FOR THIS IS CREATED!

Klurifixus commented 11 months ago

havent run owasp zap for XSS testing. because of time limit to submission on project. add label tested