Sunteți pe pagina 1din 17

Laporan Technical Vunerability Test Di Academic ITTelkom

Oleh : Ahmad Badawi Tri Andri PP

116080002 116080062

PROGRAM STUDI SISTEM INFORMASI FAKULTAS REKAYASA INDUSTRI INSTITUT TEKNOLOGI TELKOM BANDUNG 2011

1.1

Working Paper Aplikasi

1.1.1 Pengujian Website Academic.ittelkom.ac.id 1.1.1.1 Kompilasi Temuan

Pengujian ini dilaksanakan pada aplikasi akademik ITTelkom yaitu Academic.ittelkom.ac.id dengan profil hasil deteksi sebagai berikut :

Host Academic.ittelkom.ac.id

Sistem Operasi Oracle Enterprize Linux 5

Server Web Apache

Kode Aplikasi PHP

Dalam Website Academic.ittelkom.ac.id memiliki kerentanan yang terdistribusi ke dalam kategori tinggi, sedang, rendah sebagaimana dapat dilihat dalam tabel berikut ini :

Host Tinggi Academic.ittelkom.ac.id 0 Sedang 5

Kerentanan Rendah 29 Total 37

Berikut ini adalah dafta yang terdistribusi dari kerentanan :

N Alamat O 1 2

Kerentanan Port Temuan Tingkat

Potensi Dampak

Rekomendasi

Academic.ittelkom. 0/tcp ac.id Academic.ittelkom. 0/tcp ac.id Academic.ittelkom. 0/tcp ac.id

Nessus Scan Low Information OS Low Identificatio n Apache Low Banner Linux Distribution Disclosure Additional Low DNS Hostnames

None None

None None

None

If you do not wish to display this information, edit httpd.conf and set the directive 'ServerTokens Prod' and restart Apache. If you want to test them, rescan using the special vhost syntax, such as : www.example.com[192.0.32. 10] If you want to test them, rescan using the special vhost syntax, such as : www.example.com[192.0.32. 10] None

Academic.ittelkom. 0/tcp ac.id

None

Academic.ittelkom. 0/tcp ac.id

Service Detection (2nd Pass)

Low

None

Academic.ittelkom. 22/tcp SSH Server Low ac.id Type and Version Information

None

Academic.ittelkom. 53/Udp DNS Server Low ac.id hostname.bi nd Map Hostname Disclosure Academic.ittelkom. ac.id DNS Server Low Detection

None

It may be possible to disable this feature. Consult the vendor's documentation for more information. Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.

None

Academic.ittelkom. 80/tcp CGI Generic Mediu attacker may be able Contact the vendor for a patch ac.id Cross-Site to cause arbitrary or upgrade.

Scripting m (Parameters Names)

HTML and script code to be executed in a user's browser within the security context of the affected site. attacker may be able Either restrict access to the to cause arbitrary vulnerable application or HTML to be contact the vendor for an executed in a user's update. browser within the security context of the affected site. The remote web server may be vulnerable to IFRAME injections or cross-site scripting attacks : IFRAME injections allow 'virtual defacement' that might scare or anger gullible users. Such injections are sometimes implemented for 'phishing' attacks. XSS are extensively tested by four other scripts. - Some applications (e.g. web forums) authorize a subset of HTML without any ill effect. In this case, ignore this warning. In the PHP configuration file, php.ini, set the value for 'expose_php' to 'Off' to disable this behavior. Restart the web server daemon to put this change into effect.

10 Academic.ittelkom. 80/tcp CGI Generic Mediu ac.id HTML m Injections (quick test)

11 Academic.ittelkom. 80/tcp PHP Mediu attacker through a ac.id expose_php m special URL. Such Information an URL triggers an Disclosure Easter egg built into PHP itself. Other such Easter eggs likely exist, but Nessus has not

checked for them. 12 Academic.ittelkom. 80/tcp Web Server Mediu attacker may be able Contact the vendor for a patch ac.id Generic XSS m to cause arbitrary or upgrade. HTML and script code to be executed in a user's browser within the security context of the affected site. 13 Academic.ittelkom. 80/tcp HTTP ac.id TRACE / TRACK Methods Allowed Mediu The remote Disable these methods. Refer m webserver supports to the plugin output for more the TRACE and/or information. TRACK methods.

14 Academic.ittelkom. 80/tcp CGI Generic Low ac.id Tests HTTP Errors

None

Rescan with a longer network timeout or less parallelism for example, by changing the following options in the scan policy : - Network -> Network Receive Timeout (check_read_timeout) Options -> Number of hosts in parallel (max_hosts) Options -> Number of checks in parallel (max_checks) Run your run scan again with a longer timeout or less ambitious options : Combinations of arguments values = 'all combinations' is much slower than 'two pairs' or 'single'. - Stop at first flaw = 'per port' is quicker. - In 'some pairs' or 'some combinations' mode, try reducing web_app_tests.tested_values_ for_each_parameter in nessusd.conf

15 Academic.ittelkom. 80/tcp CGI Generic ac.id Tests Timeout

16 Academic.ittelkom. 80/tcp CGI Generic Low ac.id Tests Load Estimation

None

None

(all tests)

17 Academic.ittelkom. 80/tcp Browsable Low ac.id Web Directories

None

Make sure that browsable directories do not leak confidential informative or give access to sensitive resources. And use access restrictions or disable directory indexing for any that do. None

18 Academic.ittelkom. 80/tcp CGI Generic Low ac.id Injectable Parameter 19 Academic.ittelkom. 80/tcp WebDAV ac.id Detection Low

None

None None

update None

20 Academic.ittelkom. 80/tcp HyperText Low ac.id Transfer Protocol (HTTP) Information 21 Academic.ittelkom. 80/tcp HTTP Low ac.id Server Type and Version 22 Academic.ittelkom. 80/tcp HTTP ac.id Methods Allowed (per directory) Low

None

None

None

None

23 Academic.ittelkom. 80/tcp HMAP Web Low ac.id Server Fingerprinti ng 24 Academic.ittelkom. 80/tcp Gathered e- Low ac.id mail Addresses 25 Academic.ittelkom. 80/tcp Web Server Low ac.id No 404 Error Code Check 26 Academic.ittelkom. 80/tcp External Low

None

None

None

None

None

None

None

None

ac.id

URLs None None

27 Academic.ittelkom. 80/tcp Web Server Low ac.id Uses Plain Text Authenticati on Forms 28 Academic.ittelkom. 80/tcp HTTP Low ac.id Server Cookies Set 29 Academic.ittelkom. 80/tcp Web Server Low ac.id Allows Password AutoCompletion 30 Academic.ittelkom. 80/tcp Web ac.id mirroring Low

None

None

None

Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials. None None None

None None None

31 Academic.ittelkom. 80/tcp HTTP login Low ac.id page 32 Academic.ittelkom. 80/tcp Service ac.id Detection (2nd Pass) Low

Berikut ini adalah beberapa penyebab terjadinya kerentaan tersebut di atas:

1. Browsing direktori masih enable. 2. Aplikasi server yang belum terupdate karena masih ada celah kerentanan. 3. Konfigurasi Server apache Web belum dikonfigurasi secara aman. 4. Konfgurasi PHP webserver tidak aman.

Berikut ini adalah resume dari kerentanan yang dimiliki , berdasarkan kemungkinan- kemunginan kerentanan yang dijadikan dalam sekenario pengujian .

1. Kerentanan dapat di perbiki oleh application developer.

2. Kerentanan dapat di perbaiki oleh system administrator. 1.1.2 Pengujian Website Elearning.ittelkom.ac.id 1.1.2.1 Kompilasi Temuan

Pengujian ini dilaksanakan pada aplikasi akademik ITTelkom yaitu Elearning.ittelkom.ac.id dengan profil hasil deteksi sebagai berikut :

Host

Sistem Operasi Linux Kernel 2.6 on SuSE Linux 11.0

Server Web

Kode Aplikasi

Elearning.ittelkom.ac.id

Apache

PHP

Dalam Website Elearning.ittelkom.ac.id memiliki kerentanan yang terdistribusi ke dalam kategori tinggi, sedang, rendah sebagaimana dapat dilihat dalam tabel berikut ini :

Host Tinggi Academic.ittelkom.ac.id 0 Sedang 3

Kerentanan Rendah 18 Total 21

Berikut ini adalah dafta yang terdistribusi dari kerentanan :

NO

Alamat

Kerentanan Port Temuan OS Identification Tingkat Low

Potensi Dampak

Rekomendasi

1 2

Elearning.ittelkom.ac. 0/tcp id Elearning.ittelkom.ac. 0/tcp id

None None

None If you do not wish to display this information, edit httpd.conf and set the directive 'ServerTokens Prod' and restart Apache. If you do not wish to display this information, edit httpd.conf and set the directive 'ServerTokens Prod' and restart Apache. None

Apache Banner Low Linux Distribution Disclosure

Elearning.ittelkom.ac. 22/tcp Service Low id Detection (2nd Pass)

None

Elearning.ittelkom.ac. 22/tcp SSH Server id Type and Version Information Elearning.ittelkom.ac. 80/tcp PHP id expose_php Information Disclosure

Low

None

Medium

attacker through a n the PHP special URL. Such configuration file, an URL triggers php.ini, set the value an Easter egg built for 'expose_php' to into PHP itself. 'Off' to disable this behavior. Restart the

web server daemon to put this change into effect. 6 Elearning.ittelkom.ac. 80/tcp HTTP id TRACE / TRACK Methods Allowed Elearning.ittelkom.ac. 80/tcp Web Server id info.php / phpinfo.php Detection Medium The remote webserver supports the TRACE and/or TRACK methods. Disable these methods. Refer to the plugin output for more information.

Medium

a remote attacker Remove the affected can discover a file(s). large amount of information about the remote web server, including : - The username of the user who installed php and if they are a SUDO user. - The IP address of the host. - The version of the operating system. - The web server version. The root directory of the web server. - Configuration information about the remote PHP installation. None

Elearning.ittelkom.ac. 80/tcp CGI Generic Low id Tests Load Estimation (all tests) Elearning.ittelkom.ac. 80/tcp Web Server id Office File Inventory Low

None

Make sure that such files do not contain any confidential or otherwise sensitive information and that they are only accessible to those with valid credentials. Ensure sensitive data is not disclosed by CGI parameters. In

10

Elearning.ittelkom.ac. 80/tcp Web id Application Potentially

Low

None

Sensitive CGI Parameter Detection

addition, do not use CGI parameters to control access to resources or privileges. Low None None

11

Elearning.ittelkom.ac. 80/tcp HyperText id Transfer Protocol (HTTP) Information Elearning.ittelkom.ac. 80/tcp HTTP Server id Type and Version

12

Low

None

None

13

Elearning.ittelkom.ac. 80/tcp HMAP Web Low id Server Fingerprinting Elearning.ittelkom.ac. 80/tcp External URLs Low id Elearning.ittelkom.ac. 80/tcp Web Server Low id Uses Plain Text Authentication Forms Elearning.ittelkom.ac. 80/tcp HTTP Server id Cookies Set Elearning.ittelkom.ac. 80/tcp Web Server id Allows Password AutoCompletion Low Low

None

None

14 15

None None

None Make sure that every sensitive form transmits content over HTTPS. None Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials. None

16 17

None None

18 19

Elearning.ittelkom.ac. 80/tcp Web mirroring Low id Elearning.ittelkom.ac. 80/tcp Web Server id Directory Enumeration Low

None

attacker can make None arbitrary file or directory requests to any publicly available web server. The existence of a resource can be determined by analyzing the web

server HTTP response codes. There are several of Predictable Resource Location attack variations: Blind searches for common files and directories
/admin/ /backup/ /logs/ /test/ /test.asp /test.txt /test.jsp /test.log /Copy %20of %test.asp /Old %20test.a sp / vulnerabl e_file.cgi

Adding extensions to existing filename: (/test.asp)


/ test.asp.

bak / test.asp. txt /test.bak /test

For content not required to be world accessible either proper access controls should be applied, or removal of the content itself.

20 21

Elearning.ittelkom.ac. 80/tcp HTTP login id page

Low

None None

None None

Elearning.ittelkom.ac. 80/tcp Service Low id Detection (2nd Pass)

Berikut ini adalah beberapa penyebab terjadinya kerentaan tersebut di atas:

1. Browsing direktori masih enable. 2. Konfigurasi Server apache Web belum dikonfigurasi secara aman. 3. Konfgurasi PHP webserver tidak aman.

Berikut ini adalah resume dari kerentanan yang dimiliki , berdasarkan kemungkinan- kemunginan kerentanan yang dijadikan dalam sekenario pengujian .

1. Kerentanan dapat di perbiki oleh application developer. 2. Kerentanan dapat di perbaiki oleh system administrator.

1.2
1.2.1 No Area

Working Paper- Infrastruktur


Pengujian Wireless LAN SSID Mac Address Tipe Enkripsi Layer Keamanan Tambahan Tingkat Potensi Dampak Kerentanan

1 Gedung A ittelkom

N/A

VPN

Tinggi

Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa

2 Gedung B ittelkom

N/A

VPN

Tinggi

3 Gedung C ittelkom

N/A

VPN

Tinggi

Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa

4 Gedung D ittelkom

N/A

VPN

Tinggi

5 Gedung E ittelkom

N/A

VPN

Tinggi

6 Gedung F ittelkom

N/A

VPN

Tinggi

Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa

7 Gedung G ittelkom

N/A

VPN

Tinggi

8 Gedung H ittelkom

N/A

VPN

Tinggi

9 MSU

ittelkom

N/A

VPN

Tinggi

Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa Penyerang dapat bergabung dengan WLAN dan melakukan sniffing untuk mendapatkan data sensitif, melakukan flooding man in the midle attack sert berbagai kejahatanlainnya secara leluasa

10 Library

Library

N/A

VPN

Tinggi

11 Area Luar Ittelkom_ou Kampus tdoor

N/A

VPN

Tinggi

S-ar putea să vă placă și