Skip to content

Commit 69e57cf

Browse files
Merge pull request #6 from virtual-labs/main
from main
2 parents 9bbc47f + b9d094a commit 69e57cf

File tree

6 files changed

+29
-30
lines changed

6 files changed

+29
-30
lines changed

README.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,25 @@
11
## Introduction
22

3-
4-
<b>Discipline | <b>Fill your discipline name here
3+
<b>Discipline | <b>Computer Science and Engineering
54
:--|:--|
6-
<b> Lab | <b> Fill your lab name here
7-
<b> Experiment| <b> Fill your experiment name and number here
5+
<b> Lab | <b>Introductory Cyber Security Lab
6+
<b> Experiment| <b> Broken Authentication Via Cookie Manipulation
7+
## About the Experiment
88

9-
### About the Experiment
109

11-
Fill a brief description of this experiment here
1210

13-
<b>Name of Developer | <b> Fill the name of experiment owner here
11+
<b>Name of Developer | <b> Dr. Krishnashree Achuthan
1412
:--|:--|
15-
<b> Institute | <b>
16-
<b> Email id| <b>
17-
<b> Department |
13+
<b> Institute | <b> Amrita Vishwa Vidyapeetham
14+
<b> Email id| <b> krishna@amrita.edu
15+
<b> Department | Center for Cyber Security Systems and Networks
1816

1917
### Contributors List
2018

2119
SrNo | Name | Faculty or Student | Department| Institute | Email id
2220
:--|:--|:--|:--|:--|:--|
23-
1 | . | . | . | . | .
24-
2 | . | . | . | . | .
21+
1 | Vipin P | Faculty | Center for Cyber Security Systems and Networks| Amrita Vishwa Vidyapeetham | vipinp@am.amrita.edu
22+
2 | Pavithra S P |Faculty | Center for Cyber Security Systems and Networks |Amrita Vishwa Vidyapeetham | pavithrasp@am.amrita.edu
23+
3 | Anandi K | Faculty | Center for Cyber Security Systems and Networks| Amrita Vishwa Vidyapeetham | anandik@am.amrita.edu
24+
25+

experiment/aim.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
### Aim of the experiment
2-
<p>To understand how Broken Authentication via Cookie Manipulation works and how it can lead to unauthorized access. This experiment demonstrates how modifying session cookies can allow a user to escalate privileges. Users will learn how to identify and exploit such vulnerabilities.</p>
1+
2+
<p>To understand how Broken Authentication via Cookie Manipulation works and how it can lead to unauthorized access. This experiment demonstrates how modifying session cookies can allow a user to escalate privileges. Users will learn how to identify and exploit such vulnerabilities.</p>

experiment/contributors.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
1-
EMPTY
2-
<!-- Remove all lines above this line before making changes to the file -->
3-
### Subject Matter Experts
4-
| SNo. | Name | Email | Institute | ID |
5-
| :---: | :---: | :---: | :---: | :---: |
6-
| 1 | name | email | institute | id |
7-
8-
### Developers
9-
| SNo. | Name | Email | Institute | ID |
10-
| :---: | :---: | :---: | :---: | :---: |
11-
| 1 | name | email | institute | id |
1+
2+
### Contributors List
3+
4+
SrNo | Name | Faculty or Student | Department| Institute | Email id
5+
:--|:--|:--|:--|:--|:--|
6+
1 | Vipin P | Faculty | Center for Cyber Security Systems and Networks| Amrita Vishwa Vidyapeetham | vipinp@am.amrita.edu
7+
2 | Pavithra S P |Faculty | Center for Cyber Security Systems and Networks |Amrita Vishwa Vidyapeetham | pavithrasp@am.amrita.edu
8+
3 | Anandi K | Faculty | Center for Cyber Security Systems and Networks| Amrita Vishwa Vidyapeetham | anandik@am.amrita.edu
9+
10+

experiment/procedure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
### Procedure
1+
22

33
<b><p>Log in with any username and password using the form .</p></b>
44

@@ -24,4 +24,4 @@
2424
<p>Click "Refresh Session" to reload your dashboard and apply the updated session, granting admin privileges.</p>
2525

2626
<img src="./images/step9.png" alt="login" />
27-
<p>Hence, you have successfully broken authentication and gained unauthorized access to the admin dashboard by manipulating the session cookie. This happens due to the lack of proper session integrity checks, allowing users to modify and encode their own authentication data without validation.</p>
27+
<p>Hence, you have successfully broken authentication and gained unauthorized access to the admin dashboard by manipulating the session cookie. This happens due to the lack of proper session integrity checks, allowing users to modify and encode their own authentication data without validation.</p>

experiment/references.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
1-
### References
21

32
1. OWASP Foundation, *Authentication Cheat Sheet*, OWASP, 2023. [Online]. Available: [https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html](https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html)
43

54
2. OWASP Foundation, *Session Management Cheat Sheet*, OWASP, 2023. [Online]. Available: [https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html](https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html)
65

76
3. PortSwigger Web Security Academy, *Authentication vulnerabilities*, PortSwigger, 2023. [Online]. Available: [https://portswigger.net/web-security/authentication](https://portswigger.net/web-security/authentication)
87

9-
4. MITRE, *CWE-565: Reliance on Cookies without Validation and Integrity Checking*, Common Weakness Enumeration, 2023. [Online]. Available: [https://cwe.mitre.org/data/definitions/565.html](https://cwe.mitre.org/data/definitions/565.html)
8+
4. MITRE, *CWE-565: Reliance on Cookies without Validation and Integrity Checking*, Common Weakness Enumeration, 2023. [Online]. Available: [https://cwe.mitre.org/data/definitions/565.html](https://cwe.mitre.org/data/definitions/565.html)

experiment/theory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
### Theory
1+
22

33
#### Overview of Broken Authentication
44
**Broken Authentication** occurs when an application fails to correctly implement authentication or session management. This can allow attackers to bypass login mechanisms, hijack sessions, or gain access to sensitive accounts or functionality (like administrative dashboards).

0 commit comments

Comments
 (0)