On initial tests of a mobile application that I was utilizing it sent the username and password in plain-text to a server for authentication. Upon working with the company they fixed the issue and asked me to test again.
I was very impressed with them fixing the mobile application so quickly. Here are my chicken scratches of how I tested the mobile application the second time.
Using my laptop I have a wireless interface (wlan0) and then a LAN connection (eth0). I connected a wireless access points internet side of the connection to eth0. The wireless access points IP is 192.168.3.5 and my eth0 is 192.168.3.1. Then the access points internal addressing was 192.168.5.1 with DHCP range of 192.168.5.100~. I then connected my mobile device to the DHCP range of that access point.
My wlan0 card was connected to 192.168.1.100~ with a router IP of 192.168.1.1.
So in essence the flow of outbound traffic would be:
192.168.5.100
to
192.168.5.1
to
192.168.3.5
to
192.168.3.1 (eth0)
to
192.168.1.100 (wlan0)
to
192.168.1.1
to
The Internet
To configure the laptop I did the following:
echo 1> /proc/sys/net/ipv4/ip_forward - To enable IP Forwarding
Then I setup iptables to do the NATing and Forwarding:
iptables --table nat --append POSTROUTING --out-interface wlan0 -j MASQUERADE
iptables --append FORWARD --in-interface eth0 -j ACCEPT
Then to further assess the mobile application from a network layer I utilized wireshark sniffing traffic on 192.168.3.1
Viola!
Twitter: @lokut
This blog is for educational purposes only. The opinions expressed in this blog are my own and do not reflect the views of my employers.
Subscribe to:
Post Comments (Atom)
Test Authentication from Linux Console using python3 pexpect
Working with the IT420 lab, you will discover that we need to discover a vulnerable user account. The following python3 script uses the pex...
-
Here is a quick walk through of GetBoo. The first item that I found was you can harvest the usernames of the existing users that are regist...
-
As I was glancing through the logs of my honeypots I spent some time to look at the following logs. In the past I have just overlooked them...
-
I thought I would work through a few of these web applications provided by OWASP on their broken web applications VM. The first one I th...
-
Today looking at the logs of the honeypots, I became curious based on the whois of the IP Addresses attempting to login to SSH which country...
-
Recently I was doing some scanning with a tool that is available on github called masscan. The tool allows you to configure a configuration...
No comments:
Post a Comment