This is a simple Python web application that contains an example of an Insufficient Logging & Monitoring vulnerability.
Definition from OWASP:
Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.
To build this lab you will need Docker and Docker Compose.
After cloning this repository, you can type the following command to install the vulnerable application:
make install
Finally run the app and visit localhost:3001 !
To understand how this vulnerability can be exploited, check this section!
(Spoiler alert 🧐) To understand how this vulnerability can be mitigated, check this other section!
Yes, please. ⚡