Skip to content

Login page development with Flask and pentesting for the vulnerability

Notifications You must be signed in to change notification settings

arzuozkan/BasicLoginPage

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

BasicLoginPage

The purposes of the login page development is pentesting for the any vulnerability and finding how to patch them.

Development Phase

Login, Register and Profile Pages

image

Modules

  • Flask-login, user session management and authentication
  • Flask-SQLAlchemy, user information storage and database operations

Vulnerability Scanning Phase

1. Flask Weak Secret Key

The secret key can be found when it is weak and predictable by using flask-unsign tool. The output of the tool includes decoding cookie content and secret key. After changing the cookie data, another session becomes accessible.

unsign

The user_id part of the decoded cookie is changed to 3 and signed with a previosly found secret key.

sign

Attacker can access other users session with tampered cookie.

As mitigation, secret key must random and long enough. The commands shown in the image can be given as an example of secret key generation.

image

  • TODO: coming soon

About

Login page development with Flask and pentesting for the vulnerability

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published