NON-SENSITIVE VERSION

COMPREHENSIVE SECURITY AUDIT REPORT

Resunga Multiple Campus

Report Type: NON-SENSITIVE PUBLICATION VERSION

Organization: Resunga Multiple Campus

Report Date: December 11, 2025

Auditor: Anuj Panthi

Title: Independent Cybersecurity Researcher

Audit Type: External, Non-Intrusive Security Assessment

Assessment Period: 30-Day Window

Methodology: OWASP & NIST-aligned

Classification: PUBLIC - FOR PORTFOLIO

IMPORTANT NOTICE

This is a non-sensitive version of the original security audit report. All confidential information including specific IP addresses, internal domain names, API endpoints, and sensitive technical details have been redacted or generalized to protect institutional security while demonstrating assessment methodology and professional reporting standards.

Table of Contents

1. Executive Summary

This comprehensive security audit examined the publicly accessible digital infrastructure of an educational institution. The assessment followed strict non-intrusive methodologies and focused on identifying potential vulnerabilities in internet-facing systems without attempting exploitation.

Key Findings Overview

Critical
1
High
2
Medium
5
Low
7

Risk Distribution

CRITICAL: 1 Exposed system documentation revealing complete application blueprint

HIGH: 2 SSL/TLS certificate misconfigurations affecting multiple systems

MEDIUM: 5 Email security deficiencies and configuration issues

LOW: 7 Implementation flaws and minor configuration weaknesses

Overall Security Posture

The organization demonstrates moderate security maturity with several critical areas requiring immediate attention. While basic security controls are in place (firewall, authentication), significant information exposure and configuration issues present substantial attack surface reduction opportunities.

⚠️ Immediate Action Required: The exposure of complete system documentation represents a critical security risk that must be addressed within 24 hours.

2. Audit Scope & Methodology

2.1 Scope of Testing

INCLUDED:

EXCLUDED:

2.2 Testing Timeline

Phase Duration Dates
Reconnaissance Phase 7 days November 2025
Active Testing Phase 3 days December 2025
Reporting Phase 1 day December 11, 2025

2.3 Tools Used

Category Tools
Network Scanning Nmap
HTTP Analysis curl, whatweb
Vulnerability Scanning nuclei (limited scope)
SSL Analysis openssl, testssl.sh
DNS Analysis nslookup, dig
Subdomain Discovery subfinder, crt.sh
Email Security mxtoolbox.com
Manual Testing Browser inspection, console analysis

3. Asset Discovery & Inventory

SENSITIVE DATA REDACTED: Original asset discovery section contained specific domain names, IP addresses, and infrastructure details that have been removed for security reasons.

3.1 Infrastructure Overview

Property Generalized Findings
Primary Systems Web application, administrative interfaces, email services
Hosting Infrastructure Cloud-based hosting with multiple service providers
DNS Configuration Multiple name servers with international distribution
Network Services HTTP, HTTPS, SSH, FTP services detected

3.2 Subdomain Analysis

Assessment: Multiple subdomains were identified serving various functions including administrative interfaces, email services, and specialized applications.

Subdomain Type Function Security Status
Administrative Management interfaces ❌ Security issues identified
Email Services Email hosting and webmail ⚠️ Mixed security posture
Application Services Specialized applications ⚠️ Configuration issues
Control Panels Management consoles ❌ Insecure implementations

3.3 Network Service Analysis

PORT STATE SERVICE SECURITY ASSESSMENT 21/tcp open ftp Access properly restricted 22/tcp open ssh Standard service detected 25/tcp filtered smtp Firewall protection active 80/tcp open http Active web service 443/tcp open https Encrypted web service 3306/tcp filtered mysql Database access restricted 3389/tcp filtered ms-wbt-server Remote access blocked

4. Critical Vulnerabilities

CRITICAL Exposed System Documentation with Complete Application Blueprint

Property Value
CVSS Score 9.1 (Critical)
Impact Complete information disclosure of system architecture
Attack Vector Network (remotely exploitable)

Technical Details:

Exposed Information Categories:

1. Administrative Management:

/api/[REDACTED]/GetAdminProfile /api/[REDACTED]/CreateAdmin /api/[REDACTED]/UpdateAdmin /api/[REDACTED]/DeleteAdmin

2. Authentication Systems:

/api/[REDACTED]/Login /api/[REDACTED]/ResetPassword /api/[REDACTED]/ChangePassword /api/[REDACTED]/SessionManagement

3. Data Models and Schemas:

Risk Assessment:

Factor Rating
Attack Vector Network (remotely exploitable)
Attack Complexity Low (documentation provides clear guidance)
Privileges Required None (publicly accessible)
User Interaction None
Confidentiality Impact High (complete system blueprint)
Integrity Impact High (informs attack strategies)
⚠️ Immediate Remediation Required: While endpoints may require authentication, the exposed documentation provides attackers with a complete system roadmap for targeted attacks, significantly reducing the effort required for successful exploitation.

5. High Risk Vulnerabilities

HIGH SSL/TLS Certificate Misconfiguration

Property Value
CVSS Score 7.4 (High)
Affected Systems Multiple critical subdomains

Issues Identified:

  1. Certificate Name Mismatch: Certificates issued for incorrect domain names
  2. Shared Certificates: Single certificate used across multiple unrelated domains
  3. Certificate Validation Issues: Browser security warnings triggered

SSL Configuration Security:

Risk Impact:

HIGH Missing HTTPS for Critical Administrative Interfaces

Property Value
CVSS Score 6.5 (Medium-High)
Affected Systems Administrative control panels

Technical Details:

Service scan results for administrative interface: HTTP (80/tcp): Active - UNENCRYPTED ACCESS HTTPS (443/tcp): Certificate issues detected

Risk Assessment:

6. Medium Risk Vulnerabilities

MEDIUM Email Security Deficiencies

Property Value
CVSS Score 5.3 (Medium)
Domain Institutional email domain

MX Toolbox Analysis Results:

1. DMARC Issues:

2. SPF Issues:

v=spf1 ip4:[REDACTED] include:[REDACTED] ~all

3. DNS Configuration Issues:

Risk Impact:

MEDIUM Mixed Content Security Issue

Property Value
CVSS Score 5.0 (Medium)
Location Primary web application

Technical Details:

<script src="http://[REDACTED]/script.js"></script>

Risk Impact:

MEDIUM Information Leakage in Application Systems

Property Value
CVSS Score 4.3 (Medium)

Issues Identified:

1. Test Data in Production:

2. Broken Functionality:

3. Debug Information:

Console error messages revealing internal system details Authentication error information leakage

MEDIUM Insecure Subdomain Implementations

Property Value
CVSS Score 4.0 (Medium)

Affected Systems:

  1. Control Panel Subdomains: Insecure authentication mechanisms
  2. Service Subdomains: JavaScript-based credential collection
  3. Application Subdomains: Error-prone implementations
  4. Development Subdomains: Internal server errors exposed

Risk Impact:

7. Low Risk Findings

LOW UI/UX Flaws and Content Issues

Property Value
CVSS Score 2.5 (Low)

Issues Identified:

  1. External Link Issues: Misconfigured social media links
  2. Content Currency: Outdated copyright and information
  3. Server Errors: Non-critical functionality returning errors
  4. Empty Content Sections: Unpopulated information areas
  5. Broken Features: Non-functional interface elements
  6. Robots.txt: Improper implementation

LOW Directory Traversal Attempts (Properly Blocked)

Property Value
CVSS Score 1.0 (Low - Successfully Mitigated)

Testing Results:

Testing sensitive file access: /.env: 403 Forbidden (Properly blocked) /config.php: 404 Not Found /backup.zip: 404 Not Found /.git/: 403 Forbidden (Properly blocked)

Security Controls Working:

LOW Session Management Implementation

Property Value
CVSS Score 2.0 (Low)

Cookie Analysis:

set-cookie: XSRF-TOKEN=[REDACTED]; secure; samesite=lax set-cookie: session_cookie=[REDACTED]; httponly; samesite=lax; secure

Security Assessment:

LOW SQL Injection & XSS Testing Results (Negative)

Property Value
CVSS Score 0.0 (Informational - No Vulnerability Found)

Testing Results:

SQL Injection Testing:

Cross-Site Scripting Testing:

8. Security Strengths Identified

Positive Security Controls

8.1 Active Firewall/WAF Protection

8.2 Proper Authentication Enforcement

8.3 Secure Session Management

8.4 Directory Protection

8.5 Modern TLS Configuration

9. Remediation Prioritization Matrix

9.1 Immediate Actions (Within 24 Hours)

Priority Action Owner Effort
CRITICAL #1 Remove Public System Documentation Development Team Low
CRITICAL #2 Fix Admin HTTPS Certificate Issues IT Administrator Medium

9.2 Short-Term Actions (Within 7 Days)

Priority Action Owner Effort
HIGH #3 Implement DMARC Policy IT Administrator Low
HIGH #4 Fix SSL Certificate Mismatches IT Administrator Medium
MEDIUM #5 Secure Insecure Subdomains Development Team High
MEDIUM #6 Fix Mixed Content Issues Development Team Low

9.3 Medium-Term Actions (Within 30 Days)

Priority Action Owner Effort
MEDIUM #7 DNS Configuration Cleanup IT Administrator Medium
MEDIUM #8 WAF Tuning and Optimization Security Team Medium
LOW #9 UI/UX Improvements Content Team Low
LOW #10 Security Headers Enhancement Development Team Medium

10. Technical Recommendations

10.1 SSL/TLS Configuration

Recommended nginx configuration:

ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512; ssl_prefer_server_ciphers off; ssl_session_cache shared:SSL:10m; ssl_session_timeout 10m; add_header Strict-Transport-Security "max-age=63072000" always;

Certificate Management:

10.2 API Security Hardening

Documentation Protection:

// Production environment configuration if (!env.IsDevelopment()) { app.UseSwaggerUI(c => { c.SwaggerEndpoint("/swagger/v1/swagger.json", "API v1"); c.RoutePrefix = "api-docs"; // Custom path c.DocumentTitle = "Internal API Documentation"; }); // Add authentication middleware app.UseMiddleware<SwaggerAuthMiddleware>(); }

API Endpoint Protection:

10.3 Email Security Implementation

DMARC Configuration:

_dmarc.example.edu.np. IN TXT "v=DMARC1; p=none; rua=mailto:[email protected]; ruf=mailto:[email protected];"

SPF Record Enhancement:

example.edu.np. IN TXT "v=spf1 ip4:[SERVER_IP] include:[HOSTING_PROVIDER] -all"

DKIM Implementation:

10.4 Security Headers Implementation

Recommended Headers:

add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' https://trusted.cdn.com; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self'; connect-src 'self'; frame-ancestors 'none';"; add_header X-Frame-Options "DENY"; add_header X-Content-Type-Options "nosniff"; add_header Referrer-Policy "strict-origin-when-cross-origin"; add_header Permissions-Policy "geolocation=(), microphone=(), camera=()";

11. Conclusion

11.1 Overall Security Posture Assessment

The assessed organization demonstrates mixed security maturity with both significant strengths and critical vulnerabilities. Basic security controls including firewall protection, secure session management, and input validation are implemented. However, the exposure of complete system documentation represents a critical risk that requires immediate attention.

Security Maturity Score: 55/100

(Based on weighted vulnerability assessment)

11.2 Key Successes

  1. Active Security Monitoring: WAF successfully blocked intrusive scanning
  2. Authentication Controls: Proper 401 responses and no user enumeration
  3. Session Security: HttpOnly, Secure, and SameSite cookies implemented
  4. TLS Configuration: Modern protocols and ciphers enabled
  5. Input Validation: No SQLi or XSS vulnerabilities detected

11.3 Critical Concerns

  1. Information Disclosure: Complete system blueprint publicly accessible
  2. Certificate Issues: Mismatched subjects and shared certificates
  3. Email Security: No DMARC implementation enabling spoofing
  4. Insecure Subdomains: Insecure authentication mechanisms
  5. Mixed Content: HTTP resources in HTTPS pages

11.4 Strategic Recommendations

Timeline Priority Actions
Immediate (Week 1) 1. Remove public system documentation
2. Fix critical HTTPS certificate issues
3. Implement DMARC policy
Short-Term (Month 1) 4. Conduct security awareness training
5. Implement comprehensive security headers
6. Fix all certificate mismatches
Medium-Term (Quarter 1) 7. Establish security monitoring program
8. Conduct penetration testing
9. Develop incident response plan

11.5 Final Assessment

The organization has established a foundation for security but requires focused effort to address critical vulnerabilities. With the remediation actions outlined in this report, significant attack surface reduction can be achieved, improving security posture to protect institutional data and maintain service availability.

Next Steps:

  1. Prioritize remediation based on risk matrix
  2. Implement monitoring for critical security controls
  3. Consider regular security assessments for continuous improvement
  4. Develop comprehensive security policies and procedures

Auditor: Anuj Panthi

Title: Independent Cybersecurity Researcher

Date: December 11, 2025

Confidentiality Notice

This non-sensitive version has been prepared for publication purposes. The original confidential report contains sensitive security information including specific IP addresses, domain names, API endpoints, and detailed technical configurations that have been redacted in this version to protect institutional security.

Publication Authorization: This non-sensitive version may be published on the auditor's portfolio (anujpanthi.com.np) with full credit to Anuj Panthi, subject to organizational approval as documented in the final acknowledgement letter.

END OF NON-SENSITIVE REPORT

Generated on December 11, 2025
Comprehensive Security Audit Report - Non-Sensitive Version
Auditor: Anuj Panthi | anujpanthi.com.np

This is a non-sensitive publication version. Original confidential report contains additional sensitive details.