Pen-Test Report
Penetration Testing Report for Iyaloja
Date: 20-August-2024
Tested By: Iamroyalmayor
Executive Summary:
This penetration test was conducted on the website and server of Iyaloja, focusing on
identifying potential security vulnerabilities. The testing involved the public-facing
website, admin dashboard, and associated server infrastructure. Significant findings
include non-encrypted sensitive data transmission, open FTP ports, and server
instability under high testing aggression.
Key Findings:
- Sensitive Data Transmission: User credentials and session tokens are transmitted in
plain-text, making the application vulnerable to man-in-the-middle (MitM) attacks.
- Open FTP Port: An open FTP port was discovered, which could be exploited for
unauthorized access.
- Server Instability: The server exhibited signs of instability when subjected to
aggressive scanning, making it vulnerable to Denial of Service (DoS) attacks.
Recommendations:
- Implement HTTPS across all web pages to encrypt data in transit.
- Restrict or secure the FTP port, and consider using SFTP or FTP over SSL/TLS.
- Configure the server to handle high traffic or implement rate-limiting to prevent
DoS attacks.
1. Introduction
1.1 Scope of Work
The scope of this penetration test includes the following assets:
- Website: https://dev.iyaloja.ng
Server IP:-
- Admin Dashboard: https://admindev.iyaloja.ng/authentication
Server IP:- Objectives
The objectives of this penetration test were to:
- Identify vulnerabilities in the website and admin dashboard.
- Test the server's resilience to common attack vectors.
- Provide actionable recommendations to enhance security.
2. Methodology
The testing methodology was divided into the following phases:
- Reconnaissance: Gathering information about the target systems.
- Vulnerability Scanning: Identifying potential vulnerabilities using automated tools.
- Manual Testing: Exploiting vulnerabilities to assess their impact.
- Reporting: Documenting findings and providing recommendations.
3. Detailed Findings
3.1 Network and Infrastructure
IP Address:-
:-
Open Ports:
- FTP (Port 21): Open and accessible.
- HTTP (Port 80): Open, serving the main website.
- HTTPS (Port 443): Not enforced across all web pages.
And many more
Issue: FTP Port Open
- Risk: High
- Description: The FTP service is accessible, which could allow unauthorized users to
connect and transfer files. FTP is inherently insecure due to the lack of encryption.
- Recommendation: Disable the FTP service or switch to a secure alternative like SFTP.
3.2 Web Application
Technologies Identified:
- CMS: WordPress
- CDN: jsDelivr, jQuery CDN
- Web Server: Apache HTTP Server
- Server-Side: PHP
- Client-Side: JavaScript, jQuery, WooCommerce (WordPress Plugin)
3.2.1 Unencrypted Data Transmission
- URL: https://admindev.iyaloja.ng/authentication
url - dev.iyaloja.ng
- Issue: Sensitive user credentials (username and password) are transmitted in plaintext.
- Impact: High. This vulnerability could allow an attacker to intercept credentials and
gain unauthorized access.
- Recommendation: Enforce HTTPS on all pages, especially those handling sensitive
data, and use HSTS to prevent HTTP downgrade attacks.
3.2.2 Server Instability
- Observation: During aggressive testing, the web server became unresponsive,
indicating potential DoS vulnerabilities.
- Impact: Medium. While this might not lead to a direct breach, it could be exploited
to disrupt services.
- Recommendation: Implement rate-limiting and optimize server resources to
handle unexpected traffic spikes.
4. Recommendations
4.1 Immediate Actions
- Encrypt All Data in Transit: Implement HTTPS across all pages, and ensure sensitive
data is never sent in plain-text.
- Secure FTP Access: Either disable FTP or switch to a secure protocol like SFTP. Ensure
that only necessary ports are open.
- Enhance Server Stability: Configure the server to better handle high traffic, possibly
by upgrading hardware or optimizing software configurations.
4.2 Long-term Actions
- Regular Security Audits: Conduct periodic penetration tests and vulnerability
assessments.
- Employee Training: Ensure staff are trained on security best practices, particularly
concerning phishing and social engineering attacks.
- Continuous Monitoring: Implement monitoring tools to detect and respond to
security incidents in real-time.
Note : Constant updating the word press
5. Conclusion
The penetration test of Iyaloja's web application and server revealed critical
vulnerabilities, including the transmission of sensitive data in plain-text, an open
Ports on there server ( FTP port), and potential susceptibility to DoS attacks. By
addressing these issues through encryption, securing FTP access, and enhancing
server stability, Iyaloja can significantly improve its security posture.
Prepared by:
Ilesanmi Sulaimon Ademola-