Hacking Node.js web services

shodan. “X-Powered-By: Express”

shodan + exploitsearch

whoami
sysadmin, VoIP dev, pentester ...
@jesusprubio
Emergent Solutions Team
(Backend Developer)
a1 - injection

Server side JS

SQL

NoSQL

db.users.findOne({“userName”: “admin”, “password”: { “$gt”: “” } } )

rules

Use mature stuff

About rolling your own crypto, session management ...

Cleanup

a2 - broken auth

Session Management: encrypt user credentials in DB, secure cookies, sessions timeout ...

Password Guessing Attack: username/passwords enumeration, password complexity, length ...

ZAP. creds brute-force
ZAP. creds brute-force
a3 - XSS. reflected
XSS. persistent
XSS. DOM based
a4 - insecure DOR
a5 - security misconfig
a6 - sensitive data
a7 - access controls
a8 - CSRF
CSRF. solution
a9 - insecure components. vulns
insecure components. nsp client
insecure components. malware
insecure components. real case
a10 - unvalidated redirects
more ZAP. auto-scan
My 2 cts. checklist

:) ¿?

Hacking Node.js web services

By Jesús Pérez