Demo Site (Available during workshop)
- Python 3
- A browser of your choice with inspect element functionality
- Clone the file into you directory
- Run
pip install -r requirements.txt
to install dependencies - Change directory to WebServer
- Set the
FLASK_DEBUG
environment variable to1
if debugging (e.g.export FLASK_DEBUG=1
(Linux) or$Env:FLASK_DEBUG = 1
(Powershell)) - Run
python3 __main__.py
- The webserver should be running and if you go to
http://localhost:3000
you should be able to see the main page of the website.
Showcase vulnerabilites:
- SQLI (SQL Injection)
- CSRF (Cross Site Request Forgery)
- Stored XSS (Stored Cross Site Scripting)
- Reflected XSS (Reflected Cross Site Scripting)
- Explain Website Basics
- Explain CSRF, XSS and SQLi
- Hands on fake orbital website exploit
- Other discussions
- Ads for NUS Greyhats
Link to Workshop Slides: here
Can you figure out how to do the XSS with the CSRF Token protection in place? (Answer is in one of the useful links below)
Visit our Official Webpage at NUS Greyhats
If you are a student who is interested in helping out with such activities, do contact us here
If you are a speaker who is willing to present at our security Wednesdays please contact us here