Advertisement
Guest User

M R Davis Library Report

a guest
Jan 24th, 2017
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.05 KB | None | 0 0
  1. Penetration Testing Report for M R Davis Public Library, Southaven
  2.  
  3. Enable passwords to be remembered is enabled.
  4. Autofill forms is enabled.
  5.  
  6. Adobe flash update needed
  7.  
  8.  
  9. 26 malicious startup pages in Chrome
  10. Malicious extensions enabled
  11. GoGameGo extension results in malicious homepage with 3'rd party search engine they probably make a lot of money from.
  12.  
  13. THE VICTIM
  14. R*** M********
  15. re********'s Google account synced with Chrome
  16. re********@gmail.com still logged in. She uses SugarDaddyForMe, also recently applied for an extension on her utilities. She also is now forwarding her e-mail to another account I see. Wonder if that's the result of her being logged in to this computer.
  17. Her Yahoo! mail account is also logged in, s****2007@yahoo.com. At this time we find that she receives e-mails from casinos in Las Vegas. Serious vulnerability.
  18.  
  19. There is a cookie for https://accessms.mdes.ms.gov/accessms/openAMLogin.do but their website is currently under maintenance. Could actually allow access to someones account for a government website. Serious vulnerability.
  20.  
  21. If the root or "admin" password is bypassed to modify settings, passwords can be shown in Chrome. Potentially a vulnerability within the Chrome browser would show the passwords.
  22.  
  23. https://apply.adeccousa.com/job-seekers/pages/Application.aspx did not autofill R***'s personal information. However it is highly likely that this information could still be obtained from this incident with sufficient effort and knowledge.
  24.  
  25. https://secure.indeed.com/account/login returned autofill data containing R***'s username and cloaked password allowing an attacker access to her Indeed.com personal information. This allows an attacker to delete her account as well. It immediately results in letting it be known to a stranger, "R*** M******* look for jobs in Hernando, MS., goes to the library and uses SugarDaddyForMe".
  26.  
  27.  
  28. ***
  29.  
  30. w***_a******@yahoo.com also returned autofill data. His password was not immediately compromised but it is possible that with effort it could be obtained.
  31.  
  32. ***
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement