SlideShare uma empresa Scribd logo
1 de 10
CERT- IN CERT- IN CERT- IN CERT- IN
                         VULNERABILITY REPORT FORM
                         VULNERABILITY REPORT FORM
                         VULNERABILITY REPORT FORM
                         VULNERABILITY REPORT FORM
   For official use only: For official use only: For official use only: For official use only:
                          Vulnerability number CERT-In__________________________
                          Vulnerability number CERT-In__________________________
                          Vulnerability number CERT-In__________________________
                          Vulnerability number CERT-In__________________________

1. Contact Information of the person reporting: 1. Contact Information of the
person reporting: 1. Contact Information of the person reporting: 1. Contact
Information of the person reporting:
Name: Siddharth         Organization: SERC, IISc Bangalore.         Organization:
Amitkumar Bhattacharya                                              SERC, IISc
                                                                    Bangalore. Title:
Office Phone:           Email:siddharth.siom@gmail.com              Email:siddharth.
Cell Phone.Pager:                                                   siom@gmail.co
                                                                    m Fax Number:




2. Date and Time of Identification: 2. Date and Time of Identification: 2. Date and
Time of Identification: 2. Date and Time of Identification:
Date: 16-Dec-2008                                      Date: 16-Dec-2008 Time:
                                                       00:00:00 Time: 00:00:00
3. Type of Vulnerability (check all that apply): 3. Type of Vulnerability (check all
that apply): 3. Type of Vulnerability (check all that apply): 3. Type of Vulnerability
(check all that apply):
Input Validation Error        (YES)                    Environment Error Environment
Boundary Condition Error                               Error Input Validation
Buffer Over Flow                                       Error        (YES)
Access Validation Error       (YES)                    Configuration Error
Exceptional Conditional Error                          Race Condition
                                                       Others
                                                       Configuration Error
                                                       Race Condition
                                                       Others
                                                       Boundary Condition Error
                                                       Buffer Over Flow
                                                       Access Validation Error
                                                       (YES)
                                                       Exceptional Conditional Error
4. Common Weakness Enumeration (CWE) : (if any) 4. Common Weakness
Enumeration (CWE) : (if any) 4. Common Weakness Enumeration (CWE) : (if any)
4. Common Weakness Enumeration (CWE) : (if any)
5. Information of Affected System: 5. Information of Affected System: 5.
Information of Affected System: 5. Information of Affected System:
Application               Operating System                            Operating
                                                                      System
                                                                      Hardware
Name:                     Name Microsoft                              Name Name
Directorate of Technical Version                                      Microsoft
Education                 Release                                     Version
(http://dte.org.in/) Web                                              Release
Application/Website                                                   Version
Version --                                                            Release
Release --
6. Vulnerability Description (Attach additional sheets if required): 6. Vulnerability
Description (Attach additional sheets if required): 6. Vulnerability Description
(Attach additional sheets if required): 6. Vulnerability Description (Attach
additional sheets if required):
Documented in: Documented in: Documented in: Documented in:
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
on Dec-16-2008.

On Directorate of Technical Education Website,
http://dte.org.in


Part 1 of problem:
http://dte.org.in/dtechat/chat.asp
The chat page is the most vulnerable part of their website
Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message

Part 2 of problem:
http://dte.org.in/feedback/feedback.asp
which submits data to
http://dte.org.in/feedback/feedback1.asp
doesnt accept feedbacks

It shows
Microsoft OLE DB Provider for SQL Server error
'80040e09'

INSERT permission denied on object 'Grv', database
'DEGREE', owner 'dbo'.

/feedback/feedback1.asp, line 8
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
on Dec-16-2008.

On Directorate of Technical Education Website,
http://dte.org.in
Part 1 of problem:
http://dte.org.in/dtechat/chat.asp
The chat page is the most vulnerable part of their website
Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message

Part 2 of problem:
http://dte.org.in/feedback/feedback.asp
which submits data to
http://dte.org.in/feedback/feedback1.asp
doesnt accept feedbacks

It shows
Microsoft OLE DB Provider for SQL Server error
'80040e09'

INSERT permission denied on object 'Grv', database
'DEGREE', owner 'dbo'.

/feedback/feedback1.asp, line 8
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
on Dec-16-2008.

On Directorate of Technical Education Website,
http://dte.org.in


Part 1 of problem:
http://dte.org.in/dtechat/chat.asp
The chat page is the most vulnerable part of their website
Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message

Part 2 of problem:
http://dte.org.in/feedback/feedback.asp
which submits data to
http://dte.org.in/feedback/feedback1.asp
doesnt accept feedbacks

It shows
Microsoft OLE DB Provider for SQL Server error
'80040e09'

INSERT permission denied on object 'Grv', database
'DEGREE', owner 'dbo'.

/feedback/feedback1.asp, line 8
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
on Dec-16-2008.

On Directorate of Technical Education Website,
http://dte.org.in


Part 1 of problem:
http://dte.org.in/dtechat/chat.asp
The chat page is the most vulnerable part of their website
Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message

Part 2 of problem:
http://dte.org.in/feedback/feedback.asp
which submits data to
http://dte.org.in/feedback/feedback1.asp
doesnt accept feedbacks

It shows
Microsoft OLE DB Provider for SQL Server error
'80040e09'

INSERT permission denied on object 'Grv', database
'DEGREE', owner 'dbo'.

/feedback/feedback1.asp, line 8
7. Vulnerability Consequences: 7. Vulnerability Consequences: 7. Vulnerability
Consequences: 7. Vulnerability Consequences:
Because of Part 1: Because of Part 1: Because of Part 1: Because of Part 1:
The page content can be changed to show objectionable content/Virtual Defacing
Some Porn Image/Video/IFRAME content can be easily inserted on the site.

Script Kiddies with javascript expertise can make this site overloaded with unnecessary
undesired unexpected chat traffic, even slow it down so much, that it becomes of no use.
Thereby wreaking havoc on chat part of Website.
Using say …
Infinite Looped Auto Refresh on Chat Page can be introduced.
Multiple Popup Windows increasing traffic on Web server and slowing it down if
possible.

Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on
encrypted messages on chat part to communicate with each other in coded language.
Without letting anyone know their location/coordinates, even if their email IDs are under
the scanner by Interpol/CBI/NIA/CID etc.

Since any complex javascript can be run on this site,
Web Client (visitor’s) identity is also at stake.

Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a
hacker’s rouge site for displaying forged web content which got artificially embedded
into chat section.
e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB
standard(from original site))
These visitors could end up having machines, acting as key-loggers/screen shot capture
zombie machines with rootkits ready to be remotely monitored/synchronized and
remotely controlled.

Possibilities of Phishing Attack.
Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS
cannot be ruled out.


Severity and Impairment of Operations: Could be High
If conditions are created, that this causes dte servers with load balancing to cross Load
Test + Stress Test threshold objectives, for which it was engineered to serve,

Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India
and Abroad.
Imagine such a situation, when students all over India are coming in to check exam
results etc ...
(Important Critical Moments)

Height of irresponsibility & Stupidity
Plz Respond & Act
Indians cannot Accept their Technical Education (If it really stands for it) to be such a
soft target.

Because of Part 2:
It reveals database name as "DEGREE"
Which is unacceptable.
The page content can be changed to show objectionable content/Virtual Defacing
Some Porn Image/Video/IFRAME content can be easily inserted on the site.

Script Kiddies with javascript expertise can make this site overloaded with unnecessary
undesired unexpected chat traffic, even slow it down so much, that it becomes of no use.
Thereby wreaking havoc on chat part of Website.
Using say …
Infinite Looped Auto Refresh on Chat Page can be introduced.
Multiple Popup Windows increasing traffic on Web server and slowing it down if
possible.

Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on
encrypted messages on chat part to communicate with each other in coded language.
Without letting anyone know their location/coordinates, even if their email IDs are under
the scanner by Interpol/CBI/NIA/CID etc.

Since any complex javascript can be run on this site,
Web Client (visitor’s) identity is also at stake.

Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a
hacker’s rouge site for displaying forged web content which got artificially embedded
into chat section.
e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB
standard(from original site))
These visitors could end up having machines, acting as key-loggers/screen shot capture
zombie machines with rootkits ready to be remotely monitored/synchronized and
remotely controlled.

Possibilities of Phishing Attack.
Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS
cannot be ruled out.


Severity and Impairment of Operations: Could be High
If conditions are created, that this causes dte servers with load balancing to cross Load
Test + Stress Test threshold objectives, for which it was engineered to serve,

Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India
and Abroad.
Imagine such a situation, when students all over India are coming in to check exam
results etc ...
(Important Critical Moments)

Height of irresponsibility & Stupidity
Plz Respond & Act
Indians cannot Accept their Technical Education (If it really stands for it) to be such a
soft target.

Because of Part 2:
It reveals database name as "DEGREE"
Which is unacceptable.
The page content can be changed to show objectionable content/Virtual Defacing
Some Porn Image/Video/IFRAME content can be easily inserted on the site.

Script Kiddies with javascript expertise can make this site overloaded with unnecessary
undesired unexpected chat traffic, even slow it down so much, that it becomes of no use.
Thereby wreaking havoc on chat part of Website.
Using say …
Infinite Looped Auto Refresh on Chat Page can be introduced.
Multiple Popup Windows increasing traffic on Web server and slowing it down if
possible.

Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on
encrypted messages on chat part to communicate with each other in coded language.
Without letting anyone know their location/coordinates, even if their email IDs are under
the scanner by Interpol/CBI/NIA/CID etc.

Since any complex javascript can be run on this site,
Web Client (visitor’s) identity is also at stake.

Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a
hacker’s rouge site for displaying forged web content which got artificially embedded
into chat section.
e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB
standard(from original site))
These visitors could end up having machines, acting as key-loggers/screen shot capture
zombie machines with rootkits ready to be remotely monitored/synchronized and
remotely controlled.

Possibilities of Phishing Attack.
Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS
cannot be ruled out.


Severity and Impairment of Operations: Could be High
If conditions are created, that this causes dte servers with load balancing to cross Load
Test + Stress Test threshold objectives, for which it was engineered to serve,

Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India
and Abroad.
Imagine such a situation, when students all over India are coming in to check exam
results etc ...
(Important Critical Moments)

Height of irresponsibility & Stupidity
Plz Respond & Act
Indians cannot Accept their Technical Education (If it really stands for it) to be such a
soft target.

Because of Part 2:
It reveals database name as "DEGREE"
Which is unacceptable.
The page content can be changed to show objectionable content/Virtual Defacing
Some Porn Image/Video/IFRAME content can be easily inserted on the site.

Script Kiddies with javascript expertise can make this site overloaded with unnecessary
undesired unexpected chat traffic, even slow it down so much, that it becomes of no use.
Thereby wreaking havoc on chat part of Website.
Using say …
Infinite Looped Auto Refresh on Chat Page can be introduced.
Multiple Popup Windows increasing traffic on Web server and slowing it down if
possible.

Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on
encrypted messages on chat part to communicate with each other in coded language.
Without letting anyone know their location/coordinates, even if their email IDs are under
the scanner by Interpol/CBI/NIA/CID etc.

Since any complex javascript can be run on this site,
Web Client (visitor’s) identity is also at stake.
Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a
hacker’s rouge site for displaying forged web content which got artificially embedded
into chat section.
e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB
standard(from original site))
These visitors could end up having machines, acting as key-loggers/screen shot capture
zombie machines with rootkits ready to be remotely monitored/synchronized and
remotely controlled.

Possibilities of Phishing Attack.
Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS
cannot be ruled out.


Severity and Impairment of Operations: Could be High
If conditions are created, that this causes dte servers with load balancing to cross Load
Test + Stress Test threshold objectives, for which it was engineered to serve,

Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India
and Abroad.
Imagine such a situation, when students all over India are coming in to check exam
results etc ...
(Important Critical Moments)

Height of irresponsibility & Stupidity
Plz Respond & Act
Indians cannot Accept their Technical Education (If it really stands for it) to be such a
soft target.

Because of Part 2:
It reveals database name as "DEGREE"
Which is unacceptable.
8. Suggested Solution: 8. Suggested Solution: 8. Suggested Solution: 8. Suggested
Solution:
For Part 1: For Part 1: For Part 1: For Part 1:
Please improve/include/filter validation of chat messages which should not allow running
of script embedded in messages

Implement validation in
http://dte.org.in/dtechat/message.asp

Using Client Side Javascript and also in ASP (Server Side)
To help reduce Bandwidth usage
And deliver better performance under load testing

For Part 2:
Hope you have performed thorough security testing of the
site to avoid SQL Injections etc ...
May I help in anyway?
In redesigning that part of the website?
Please improve/include/filter validation of chat messages which should not allow running
of script embedded in messages

Implement validation in
http://dte.org.in/dtechat/message.asp

Using Client Side Javascript and also in ASP (Server Side)
To help reduce Bandwidth usage
And deliver better performance under load testing

For Part 2:
Hope you have performed thorough security testing of the
site to avoid SQL Injections etc ...
May I help in anyway?
In redesigning that part of the website?
Please improve/include/filter validation of chat messages which should not allow running
of script embedded in messages

Implement validation in
http://dte.org.in/dtechat/message.asp

Using Client Side Javascript and also in ASP (Server Side)
To help reduce Bandwidth usage
And deliver better performance under load testing

For Part 2:
Hope you have performed thorough security testing of the
site to avoid SQL Injections etc ...
May I help in anyway?
In redesigning that part of the website?
Please improve/include/filter validation of chat messages which should not allow running
of script embedded in messages

Implement validation in
http://dte.org.in/dtechat/message.asp

Using Client Side Javascript and also in ASP (Server Side)
To help reduce Bandwidth usage
And deliver better performance under load testing

For Part 2:
Hope you have performed thorough security testing of the
site to avoid SQL Injections etc ...
May I help in anyway?
In redesigning that part of the website?
9. Other Agencies notified: 9. Other Agencies notified: 9. Other Agencies notified: 9.
Other Agencies notified:
The World is looking at this to be resolved with expectations. The World is looking at
this to be resolved with expectations. The World is looking at this to be resolved with
expectations. The World is looking at this to be resolved with expectations.
Details are there for all to see at:
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
Details are there for all to see at:
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
Details are there for all to see at:
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
Details are there for all to see at:
http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html
10. Additional Information: 10. Additional Information: 10. Additional
Information: 10. Additional Information:
Also Go Through: Also Go Through: Also Go Through: Also Go Through:
http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web-
server-techniques-used
http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web-
server-techniques-used
http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web-
server-techniques-used
http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web-
server-techniques-used

Mais conteúdo relacionado

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Reported To CERT-IN,CERT Hacked Site:Directorate of Technical Education, Mumbai India

  • 1. CERT- IN CERT- IN CERT- IN CERT- IN VULNERABILITY REPORT FORM VULNERABILITY REPORT FORM VULNERABILITY REPORT FORM VULNERABILITY REPORT FORM For official use only: For official use only: For official use only: For official use only: Vulnerability number CERT-In__________________________ Vulnerability number CERT-In__________________________ Vulnerability number CERT-In__________________________ Vulnerability number CERT-In__________________________ 1. Contact Information of the person reporting: 1. Contact Information of the person reporting: 1. Contact Information of the person reporting: 1. Contact Information of the person reporting: Name: Siddharth Organization: SERC, IISc Bangalore. Organization: Amitkumar Bhattacharya SERC, IISc Bangalore. Title: Office Phone: Email:siddharth.siom@gmail.com Email:siddharth. Cell Phone.Pager: siom@gmail.co m Fax Number: 2. Date and Time of Identification: 2. Date and Time of Identification: 2. Date and Time of Identification: 2. Date and Time of Identification: Date: 16-Dec-2008 Date: 16-Dec-2008 Time: 00:00:00 Time: 00:00:00 3. Type of Vulnerability (check all that apply): 3. Type of Vulnerability (check all that apply): 3. Type of Vulnerability (check all that apply): 3. Type of Vulnerability (check all that apply): Input Validation Error (YES) Environment Error Environment Boundary Condition Error Error Input Validation Buffer Over Flow Error (YES) Access Validation Error (YES) Configuration Error Exceptional Conditional Error Race Condition Others Configuration Error Race Condition Others Boundary Condition Error Buffer Over Flow Access Validation Error (YES) Exceptional Conditional Error 4. Common Weakness Enumeration (CWE) : (if any) 4. Common Weakness Enumeration (CWE) : (if any) 4. Common Weakness Enumeration (CWE) : (if any) 4. Common Weakness Enumeration (CWE) : (if any) 5. Information of Affected System: 5. Information of Affected System: 5.
  • 2. Information of Affected System: 5. Information of Affected System: Application Operating System Operating System Hardware Name: Name Microsoft Name Name Directorate of Technical Version Microsoft Education Release Version (http://dte.org.in/) Web Release Application/Website Version Version -- Release Release -- 6. Vulnerability Description (Attach additional sheets if required): 6. Vulnerability Description (Attach additional sheets if required): 6. Vulnerability Description (Attach additional sheets if required): 6. Vulnerability Description (Attach additional sheets if required): Documented in: Documented in: Documented in: Documented in: http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html on Dec-16-2008. On Directorate of Technical Education Website, http://dte.org.in Part 1 of problem: http://dte.org.in/dtechat/chat.asp The chat page is the most vulnerable part of their website Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message Part 2 of problem: http://dte.org.in/feedback/feedback.asp which submits data to http://dte.org.in/feedback/feedback1.asp doesnt accept feedbacks It shows Microsoft OLE DB Provider for SQL Server error '80040e09' INSERT permission denied on object 'Grv', database 'DEGREE', owner 'dbo'. /feedback/feedback1.asp, line 8 http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html on Dec-16-2008. On Directorate of Technical Education Website, http://dte.org.in
  • 3. Part 1 of problem: http://dte.org.in/dtechat/chat.asp The chat page is the most vulnerable part of their website Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message Part 2 of problem: http://dte.org.in/feedback/feedback.asp which submits data to http://dte.org.in/feedback/feedback1.asp doesnt accept feedbacks It shows Microsoft OLE DB Provider for SQL Server error '80040e09' INSERT permission denied on object 'Grv', database 'DEGREE', owner 'dbo'. /feedback/feedback1.asp, line 8 http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html on Dec-16-2008. On Directorate of Technical Education Website, http://dte.org.in Part 1 of problem: http://dte.org.in/dtechat/chat.asp The chat page is the most vulnerable part of their website Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message Part 2 of problem: http://dte.org.in/feedback/feedback.asp which submits data to http://dte.org.in/feedback/feedback1.asp doesnt accept feedbacks It shows Microsoft OLE DB Provider for SQL Server error '80040e09' INSERT permission denied on object 'Grv', database 'DEGREE', owner 'dbo'. /feedback/feedback1.asp, line 8 http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html on Dec-16-2008. On Directorate of Technical Education Website,
  • 4. http://dte.org.in Part 1 of problem: http://dte.org.in/dtechat/chat.asp The chat page is the most vulnerable part of their website Malicious JavaScripts/VBScripts can be directly sent / posted as a chat message Part 2 of problem: http://dte.org.in/feedback/feedback.asp which submits data to http://dte.org.in/feedback/feedback1.asp doesnt accept feedbacks It shows Microsoft OLE DB Provider for SQL Server error '80040e09' INSERT permission denied on object 'Grv', database 'DEGREE', owner 'dbo'. /feedback/feedback1.asp, line 8 7. Vulnerability Consequences: 7. Vulnerability Consequences: 7. Vulnerability Consequences: 7. Vulnerability Consequences: Because of Part 1: Because of Part 1: Because of Part 1: Because of Part 1: The page content can be changed to show objectionable content/Virtual Defacing Some Porn Image/Video/IFRAME content can be easily inserted on the site. Script Kiddies with javascript expertise can make this site overloaded with unnecessary undesired unexpected chat traffic, even slow it down so much, that it becomes of no use. Thereby wreaking havoc on chat part of Website. Using say … Infinite Looped Auto Refresh on Chat Page can be introduced. Multiple Popup Windows increasing traffic on Web server and slowing it down if possible. Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on encrypted messages on chat part to communicate with each other in coded language. Without letting anyone know their location/coordinates, even if their email IDs are under the scanner by Interpol/CBI/NIA/CID etc. Since any complex javascript can be run on this site, Web Client (visitor’s) identity is also at stake. Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a hacker’s rouge site for displaying forged web content which got artificially embedded into chat section. e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB standard(from original site))
  • 5. These visitors could end up having machines, acting as key-loggers/screen shot capture zombie machines with rootkits ready to be remotely monitored/synchronized and remotely controlled. Possibilities of Phishing Attack. Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS cannot be ruled out. Severity and Impairment of Operations: Could be High If conditions are created, that this causes dte servers with load balancing to cross Load Test + Stress Test threshold objectives, for which it was engineered to serve, Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India and Abroad. Imagine such a situation, when students all over India are coming in to check exam results etc ... (Important Critical Moments) Height of irresponsibility & Stupidity Plz Respond & Act Indians cannot Accept their Technical Education (If it really stands for it) to be such a soft target. Because of Part 2: It reveals database name as "DEGREE" Which is unacceptable. The page content can be changed to show objectionable content/Virtual Defacing Some Porn Image/Video/IFRAME content can be easily inserted on the site. Script Kiddies with javascript expertise can make this site overloaded with unnecessary undesired unexpected chat traffic, even slow it down so much, that it becomes of no use. Thereby wreaking havoc on chat part of Website. Using say … Infinite Looped Auto Refresh on Chat Page can be introduced. Multiple Popup Windows increasing traffic on Web server and slowing it down if possible. Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on encrypted messages on chat part to communicate with each other in coded language. Without letting anyone know their location/coordinates, even if their email IDs are under the scanner by Interpol/CBI/NIA/CID etc. Since any complex javascript can be run on this site, Web Client (visitor’s) identity is also at stake. Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a hacker’s rouge site for displaying forged web content which got artificially embedded into chat section.
  • 6. e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB standard(from original site)) These visitors could end up having machines, acting as key-loggers/screen shot capture zombie machines with rootkits ready to be remotely monitored/synchronized and remotely controlled. Possibilities of Phishing Attack. Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS cannot be ruled out. Severity and Impairment of Operations: Could be High If conditions are created, that this causes dte servers with load balancing to cross Load Test + Stress Test threshold objectives, for which it was engineered to serve, Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India and Abroad. Imagine such a situation, when students all over India are coming in to check exam results etc ... (Important Critical Moments) Height of irresponsibility & Stupidity Plz Respond & Act Indians cannot Accept their Technical Education (If it really stands for it) to be such a soft target. Because of Part 2: It reveals database name as "DEGREE" Which is unacceptable. The page content can be changed to show objectionable content/Virtual Defacing Some Porn Image/Video/IFRAME content can be easily inserted on the site. Script Kiddies with javascript expertise can make this site overloaded with unnecessary undesired unexpected chat traffic, even slow it down so much, that it becomes of no use. Thereby wreaking havoc on chat part of Website. Using say … Infinite Looped Auto Refresh on Chat Page can be introduced. Multiple Popup Windows increasing traffic on Web server and slowing it down if possible. Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on encrypted messages on chat part to communicate with each other in coded language. Without letting anyone know their location/coordinates, even if their email IDs are under the scanner by Interpol/CBI/NIA/CID etc. Since any complex javascript can be run on this site, Web Client (visitor’s) identity is also at stake. Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a
  • 7. hacker’s rouge site for displaying forged web content which got artificially embedded into chat section. e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB standard(from original site)) These visitors could end up having machines, acting as key-loggers/screen shot capture zombie machines with rootkits ready to be remotely monitored/synchronized and remotely controlled. Possibilities of Phishing Attack. Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS cannot be ruled out. Severity and Impairment of Operations: Could be High If conditions are created, that this causes dte servers with load balancing to cross Load Test + Stress Test threshold objectives, for which it was engineered to serve, Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India and Abroad. Imagine such a situation, when students all over India are coming in to check exam results etc ... (Important Critical Moments) Height of irresponsibility & Stupidity Plz Respond & Act Indians cannot Accept their Technical Education (If it really stands for it) to be such a soft target. Because of Part 2: It reveals database name as "DEGREE" Which is unacceptable. The page content can be changed to show objectionable content/Virtual Defacing Some Porn Image/Video/IFRAME content can be easily inserted on the site. Script Kiddies with javascript expertise can make this site overloaded with unnecessary undesired unexpected chat traffic, even slow it down so much, that it becomes of no use. Thereby wreaking havoc on chat part of Website. Using say … Infinite Looped Auto Refresh on Chat Page can be introduced. Multiple Popup Windows increasing traffic on Web server and slowing it down if possible. Sophisticated (Wanted) Criminals with Computer Forensic Knowledge, can pass on encrypted messages on chat part to communicate with each other in coded language. Without letting anyone know their location/coordinates, even if their email IDs are under the scanner by Interpol/CBI/NIA/CID etc. Since any complex javascript can be run on this site, Web Client (visitor’s) identity is also at stake.
  • 8. Visitor’s Browsers, can be redirected to install spyware based plugins/installers from a hacker’s rouge site for displaying forged web content which got artificially embedded into chat section. e.g: Flash Player (approx 1.5MB(from original site))/Java Plugin(Approx 15MB standard(from original site)) These visitors could end up having machines, acting as key-loggers/screen shot capture zombie machines with rootkits ready to be remotely monitored/synchronized and remotely controlled. Possibilities of Phishing Attack. Possibilities of Cross Site Scripting, gathering intelligence about Cookie values etc. XSS cannot be ruled out. Severity and Impairment of Operations: Could be High If conditions are created, that this causes dte servers with load balancing to cross Load Test + Stress Test threshold objectives, for which it was engineered to serve, Results could imply, failure to serve thousands of Indian Nationals/Citizens/Kids in India and Abroad. Imagine such a situation, when students all over India are coming in to check exam results etc ... (Important Critical Moments) Height of irresponsibility & Stupidity Plz Respond & Act Indians cannot Accept their Technical Education (If it really stands for it) to be such a soft target. Because of Part 2: It reveals database name as "DEGREE" Which is unacceptable. 8. Suggested Solution: 8. Suggested Solution: 8. Suggested Solution: 8. Suggested Solution: For Part 1: For Part 1: For Part 1: For Part 1: Please improve/include/filter validation of chat messages which should not allow running of script embedded in messages Implement validation in http://dte.org.in/dtechat/message.asp Using Client Side Javascript and also in ASP (Server Side) To help reduce Bandwidth usage And deliver better performance under load testing For Part 2: Hope you have performed thorough security testing of the site to avoid SQL Injections etc ...
  • 9. May I help in anyway? In redesigning that part of the website? Please improve/include/filter validation of chat messages which should not allow running of script embedded in messages Implement validation in http://dte.org.in/dtechat/message.asp Using Client Side Javascript and also in ASP (Server Side) To help reduce Bandwidth usage And deliver better performance under load testing For Part 2: Hope you have performed thorough security testing of the site to avoid SQL Injections etc ... May I help in anyway? In redesigning that part of the website? Please improve/include/filter validation of chat messages which should not allow running of script embedded in messages Implement validation in http://dte.org.in/dtechat/message.asp Using Client Side Javascript and also in ASP (Server Side) To help reduce Bandwidth usage And deliver better performance under load testing For Part 2: Hope you have performed thorough security testing of the site to avoid SQL Injections etc ... May I help in anyway? In redesigning that part of the website? Please improve/include/filter validation of chat messages which should not allow running of script embedded in messages Implement validation in http://dte.org.in/dtechat/message.asp Using Client Side Javascript and also in ASP (Server Side) To help reduce Bandwidth usage And deliver better performance under load testing For Part 2: Hope you have performed thorough security testing of the site to avoid SQL Injections etc ... May I help in anyway? In redesigning that part of the website? 9. Other Agencies notified: 9. Other Agencies notified: 9. Other Agencies notified: 9. Other Agencies notified:
  • 10. The World is looking at this to be resolved with expectations. The World is looking at this to be resolved with expectations. The World is looking at this to be resolved with expectations. The World is looking at this to be resolved with expectations. Details are there for all to see at: http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html Details are there for all to see at: http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html Details are there for all to see at: http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html Details are there for all to see at: http://armageddonsaviour.blogspot.com/2008/12/has-anybody-cared-to-inform-dte.html 10. Additional Information: 10. Additional Information: 10. Additional Information: 10. Additional Information: Also Go Through: Also Go Through: Also Go Through: Also Go Through: http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web- server-techniques-used http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web- server-techniques-used http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web- server-techniques-used http://www.slideshare.net/siddharthbhattacharya/hacking-a-web-site-and-secure-web- server-techniques-used