HACK STEPS
■
Use the content discovery techniques described in Chapter 4 to identify
as much of the application’s functionality as possible. Performing this
exercise as a low-privileged user is often sufficient to both enumerate
and gain direct access to sensitive functionality.
■
Where application pages are identified that are likely to present different
functionality or links to ordinary and administrative users (for example, a
Control Panel or My Home Page), try adding parameters like
admin=true
to the URL query string and the body of
POST
requests, to determine
Do'stlaringiz bilan baham: