Author: Gil Eskayo
Date: 10 December 2023
This report documents my individual security assessment conducted against Yahoo, as part of a Real World Pentest lab exercise. My objective was to identify potential client-side security vulnerabilities within the scope defined by Yahoo's public bug bounty program on HackerOne.
In conducting the security assessment of Yahoo's web application, I employed a strategic combination of manual inspection, browser developer tools, and specialized security tools, each chosen for its specific capabilities in identifying different types of vulnerabilities...
Detailed Test: To test for client-side data manipulation vulnerabilities, I used browser developer tools to inspect and modify data stored in the browser, such as cookies, localStorage, and sessionStorage...
// JavaScript snippet to inspect and modify client-side data
let userData = JSON.parse(localStorage.getItem('userPreferences'));
userData.theme = 'dark'; // Altering a preference
localStorage.setItem('userPreferences', JSON.stringify(userData));
Detailed Test: Using Burp Suite, I created a mock HTML form to simulate a CSRF attack...
<!-- HTML snippet to create a forged request -->
<form action="https://www.yahoo.com/settings" method="POST" target="_blank">
<input type="hidden" name="newSetting" value="alteredSetting">
<input type="submit" value="Submit Request">
</form>
Detailed Test: I tested for XSS vulnerabilities by injecting JavaScript code into various input fields and observing the application's response...
<script>alert('XSS Test');</script>
Detailed Test: SQL Injection vulnerabilities were tested by inputting SQL code into fields that interact with the database...
' OR '1'='1
Detailed Test: To test for buffer overflow vulnerabilities, I input excessively long strings into input fields...
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
The investigation into client-side data revealed that Yahoo effectively secures sensitive information...
The CSRF test did not yield any successful unauthorized actions...
The XSS vulnerability test showed that Yahoo has implemented strong input validation and output encoding mechanisms...
During the SQL Injection testing phase, all inputs were properly sanitized...
The buffer overflow tests involved submitting excessively long strings in various input fields...
Despite the absence of identified vulnerabilities in this assessment, maintaining a robust security posture is an ongoing process...
This security assessment of Yahoo's web platform, conducted within the defined scope and parameters of their public bug bounty program, did not reveal any direct vulnerabilities...
It is crucial to acknowledge that cybersecurity is a dynamic field...
In conclusion, while this assessment did not identify specific vulnerabilities within the scope of the bug bounty program, it highlights the importance of continuous vigilance and adaptation in the field of cybersecurity...