The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


Always try path traversal sequences using both forward slashes and



Download 5,76 Mb.
Pdf ko'rish
bet592/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   588   589   590   591   592   593   594   595   ...   875
Bog'liq
3794 1008 4334

Always try path traversal sequences using both forward slashes and

backslashes. Many input filters check for only one of these, when the file

system may support both.



Try simple URL-encoded representations of traversal sequences, using



the following encodings. Be sure to encode every single slash and dot

within your input:

dot             %2e

forward slash   %2f

backslash       %5c



Continued

Chapter 10 



Exploiting Path Traversal



339

70779c10.qxd:WileyRed  9/14/07  3:14 PM  Page 339




HACK STEPS (continued)



Try using 16-bit Unicode–encoding:

dot             %u002e

forward slash   %u2215

backslash       %u2216



Try double URL–encoding:

dot             %252e

forward slash   %252f

backslash       %255c



Try overlong UTF-8 Unicode–encoding:

dot             %c0%2e    %e0%40%ae    %c0ae    etc.

forward slash   %c0%af    %e0%80%af    %c0%2f   etc.

backslash       %c0%5c    %c0%80%5c    etc.

You can use the illegal Unicode payload type within Burp Intruder to

generate a huge number of alternate representations of any given character,

and submit this at the relevant place within your target parameter. These

are representations that strictly violate the rules for Unicode representation

but are nevertheless accepted by many implementations of Unicode

decoders, particularly on the Windows platform.



If the application is attempting to sanitize user input by removing traver-



sal sequences, and does not apply this filter recursively, then it may be

possible to bypass the filter by placing one sequence within another. For

example: 

....//


....\/

..../\


....\\

The second type of input filter commonly encountered in defenses against

path traversal attacks involves verifying whether the user-supplied filename

contains a suffix (i.e., file type) or prefix (i.e., starting directory) that the appli-

cation is expecting. This type of defense may be used in tandem with the filters

described already.



340

Chapter 10 



Exploiting Path Traversal

70779c10.qxd:WileyRed  9/14/07  3:14 PM  Page 340



HACK STEPS



Some applications check whether the user-supplied filename ends in a




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   588   589   590   591   592   593   594   595   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish