
Lab 03: Username enumeration via response timing
1. Executive Summary Vulnerability: Username Enumeration via Response Timing. Description: The application processes login attempts sequentially: first, it checks if the username exists; second, ...

1. Executive Summary Vulnerability: Username Enumeration via Response Timing. Description: The application processes login attempts sequentially: first, it checks if the username exists; second, ...

1. Executive Summary Vulnerability: Username Enumeration (via Subtle Textual Differences). Description: The application attempts to prevent enumeration by using the same error message (“Invalid u...

1. Executive Summary Vulnerability: Username Enumeration (via Verbose Error Messages). Description: The application provides different error messages depending on whether a submitted username exi...

1. Executive Summary Vulnerability: Cross-Site WebSocket Hijacking (CSWSH). Description: The application’s WebSocket handshake relies solely on HTTP cookies for session handling and lacks CSRF pr...

1. Executive Summary Vulnerability: XSS Filter Bypass & IP Ban Circumvention (via Handshake Manipulation). Description: The application employs a Web Application Firewall (WAF) or server-side...

1. Executive Summary Vulnerability: Client-Side Bypassed Cross-Site Scripting (XSS) via WebSockets. Description: The application implements a live chat feature using the WebSocket protocol. While ...

1. Executive Summary Vulnerability: Broken Access Control (Insecure Header Validation). Description: The application attempts to verify authorization by checking the HTTP Referer header. It assum...

1. Executive Summary Vulnerability: Broken Access Control in Multi-Step Logic. Description: The application splits a sensitive action (promoting a user) into a multi-step workflow: Selection ->...

1. Executive Summary Vulnerability: Insecure Direct Object Reference (IDOR) with Static File Enumeration. Description: The application saves sensitive user data (chat transcripts) to the server’s...

1. Executive Summary Vulnerability: Insecure Direct Object Reference (IDOR) leading to Sensitive Data Exposure. Description: The application uses an insecure ID parameter to retrieve user profile...