Contents
General notes about the labs
Often the lab instructions are intentionally open-ended, and you will have to figure some things out for yourselves. This module is designed to be challenging, as well as fun!
However, we aim to provide a well planned and fluent experience. If you notice any mistakes in the lab instructions or you feel some important information is missing, please let us know and we will try to address any issues.
Preparation
Action: Start by logging into Hacktivity.
Click here for a guide to using Hacktivity. This includes some important information about how to use the lab environment and how to troubleshoot during lab exercises. If you haven’t already, have a read through.
Log into Security Shepherd and work through assessed tasks
For this week’s Security Shepherd Challenges you need to use the ‘Additional Web Challenges’ VMs on Hacktivity.
Note: Remember the login details for the Kali VM is Kali/Kali.
You have the lesson and challenges to complete for:
- 3 x Insecure Cryptographic Storage
- 1 x Unvalidated Redirects and Forwards (Lesson)
Hint: The tips below are optional. Try to complete the challenges without them if you can.
Insecure Cryptographic Storage Challenge 2 Tips
Hint: You may want to use an online decoder for the Vigenere Cipher. Can you find the String and the key to use?
Insecure Cryptographic Storage Challenge 3 Tips
Hint: The encryption/decryption happens server-side, so you need to experiment with re-sending the request to decrypt. One of the letters of the alphabet, when used repeatedly, will translate into the key you need.
Conclusion
At this point you have:
-
Learned about cryptographic storage vulnerabilities and how to identify insecure implementations
-
Gained experience with various cryptographic attacks including cipher analysis and key recovery
-
Understood the risks associated with unvalidated redirects and forwards in web applications
-
Completed additional web security challenges using the Security Shepherd platform
Congratulations! These additional challenges have provided you with hands-on experience in identifying and exploiting cryptographic vulnerabilities, as well as understanding the security implications of unvalidated redirects in web applications.