The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet116/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   112   113   114   115   116   117   118   119   ...   875
Bog'liq
3794 1008 4334

64

Chapter 4 



Mapping the Application

70779c04.qxd:WileyRed  9/14/07  3:12 PM  Page 64



User-Directed Spidering

This is a more sophisticated and controlled technique, which is usually prefer-

able to automated spidering. Here, the user walks through the application in

the normal way using a standard browser, attempting to navigate through all 

of the application’s functionality. As he does so, the resulting traffic is passed

through a tool combining an intercepting proxy and spider, which monitors all

requests and responses. The tool builds up a map of the application, incorpo-

rating all of the URLs visited by the browser, and also parses all of the applica-

tion’s responses in the same way as a normal application-aware spider and

updates the site map with the content and functionality it discovers. The spi-

ders within Burp Suite and WebScarab can be used in this way (see Chapter 19

for further information).

Compared with the basic spidering approach, this technique carries numer-

ous benefits:

■■

Where the application uses unusual or complex mechanisms for navi-



gation, the user can follow these using a browser in the normal way.

Any functions and content accessed by the user will be processed by

the proxy/spider tool.

■■

The user controls all data submitted to the application and can ensure



that data validation requirements are met.

■■

The user can log in to the application in the usual way, and ensure that



the authenticated session remains active throughout the mapping

process. If any action performed results in session termination, the user

can log in again and continue browsing.

■■

Any dangerous functionality, such as 



deleteUser.jsp

, will be fully

enumerated and incorporated into the site map, because links to it will

be parsed out of the application’s responses. But the user can use his

discretion in deciding which functions to actually request or carry out.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   112   113   114   115   116   117   118   119   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish