OWASP top 10 vulnerabilities CTF lesson – Untrusted Input

CTF365 lesson is based upon OWASP top 10 vulnerabilities which is still valid in 2020. The following are the lessons that are provided by CTF365. Let me tell you they are not only top 10, instead the list is of top 11 and please note they are not in any order. You can signup security shepherd using CTF365 account and start learning.

1. Broken Session Management
2. Cross Site Request Forgery (CSRF)
3. Cross Site Scripting (XSS)
4. Failure to Restrict URL Access
5. Insecure Cryptographic Storage
6. Insecure Direct Object References
7. Poor Data Validation
8. Security Misconfiguration
9. SQL Injection (SQLi)
10. Untrusted Input
11. Unvalidated Redirects and Forwards

10. Untrusted Input

The short description has been given in the page itself but if you want to read more about it then you can always checkout the official OWASP page where they have described it more. Please click here to go to the link.

The task here is as follows

The vulnerable App must be exploited by taking advantage of an exported Activity.
To complete this challenge you’ll need to use the UntrustedInput.apk app found in the Security Shepherd Android Virtual Machine.

Go ahead and download UntrustedInput.apk and unzip it.

Unfortunately, I did not find the file and was unable to do this lesson.


Leave a Reply

Your email address will not be published. Required fields are marked *