(OWASP) A5-Security Misconfiguration

This attack can be Consider as anonymous external attackers as well as users with their own accounts that may attempt to compromise the system. Also consider insiders wanting to disguise their actions. An Attacker can accesses default accounts, unused pages, unpatched flaws, unprotected files and directories, etc. to gain unauthorized access to or knowledge of the system.


Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code. Developers and system administrators need to work together to ensure that the entire stack is configured properly. Automated scanners are useful for detecting missing patches, misconfigurations, use of default accounts, unnecessary services, etc.

Question 1 – What is Security Misconfiguration?


Ans:- Improper Server or Web Application Configuration leading to various flaws.

  • Debugging enabled.
  • Incorrect folder permissions.
  • Using default accounts or passwords.
  • Setup / Configuration pages enabled.

Question 2 – How to prevent yourself from Security Misconfiguration Vulnerability?


Ans:- The Principle of Least privilege: Everything off by default.
Ensure that the web Server is Configured according to the secure Configuration & hardening guidelines

  • Disable administration interfaces.
  • Disable debugging.
  • Disable use of default account / passwords.
  • Configure Server to prevent unauthorized access, directory listing ETC.

DEMO - Comming Soon!

~ Hack the World and Stay Noob

Twitter / Hack The Box / CTF Team / Teck_N00bs Community Telegram

Comments