The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet822/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   818   819   820   821   822   823   824   825   ...   875
Bog'liq
3794 1008 4334

486

Chapter 13 



Automating Bespoke Attacks

70779c13.qxd:WileyRed  9/14/07  3:14 PM  Page 486



T I P

Data output in tab-delimited format can be easily loaded into

spreadsheet software such as Excel for further manipulation or tidying up. In

many situations, the output from a data-harvesting exercise can be used as the

input for another automated attack.

Fuzzing for Common Vulnerabilities

The third main use of bespoke automation does not involve targeting any

known vulnerability to enumerate or extract information. Rather, your objec-

tive is to probe the application with various crafted attack strings designed to

cause anomalous behavior within the application if particular common vul-

nerabilities are present. This type of attack is much less focused than the ones

previously described, for the following reasons:

■■

It generally involves submitting the same set of attack payloads as



every parameter to every page of the application, regardless of the nor-

mal function of each parameter or the type of data that the application

expects to receive. These payloads are sometimes referred to as fuzz

strings.

■■

You do not know in advance precisely how to identify hits. Rather than



monitoring the application’s responses for a specific indicator of suc-

cess, you generally need to capture as much detail as possible in a clear

form, so that this can be easily reviewed to identify cases where your

attack string has triggered some anomalous behavior within the appli-

cation, which merits further investigation.

As you have seen when examining various common web application flaws,

some vulnerabilities manifest themselves in the application’s behavior in par-

ticular recognizable ways, such as a specific error message or HTTP status

code. These vulnerability signatures can sometimes be relied upon to detect

common defects, and they are the means by which automated application vul-

nerability scanners identify the majority of their findings (see Chapter 19).

However, in principle, any test string you submit to the application may give

rise to any expected behavior that, in its particular context, points towards the

presence of a vulnerability. For this reason, an experienced attacker using

bespoke automated techniques is usually much more effective than any fully

automated tool can ever be. Such an attacker can perform an intelligent analy-

sis of every pertinent detail of the application’s responses. He can think like an

application designer and developer. And he can spot and investigate unusual

connections between requests and responses in a way that no current tool is

able to.



Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   818   819   820   821   822   823   824   825   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish