Logging gives the ability to gain visibility into an application’s activities. The log and audit trails created allow for better troubleshooting, tracking, and incident detections. However you could become vulnerable to information leakage if you make logging and alerting events visible to a user or an attacker.
1. On the Pygoat application click A10: Insufficient Logging & Monitoring
2. Edit the application URL to display the application logs.
your.ip.address.here:8000/debug
When looking at the log we can see a get request ot the server that has a username and password to it.
INFO “GET /a10_lab?username=Hacker&password=Hacker HTTP/1.1” 301 0
3. Next check the Application Security console for new events.
4. (Optional) Now you can use the credentials to log in for A10: Insufficient Logging & Monitoring
Hacker
Hacker
Edit the application URL to display the application logs.
your.ip.address.here:8000/debug