The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws


ure the spider to exclude these from its scope. Run the spider and review



Download 5,76 Mb.
Pdf ko'rish
bet120/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   116   117   118   119   120   121   122   123   ...   875
Bog'liq
3794 1008 4334

ure the spider to exclude these from its scope. Run the spider and review

the results for any additional content that it discovers.



The site map generated by the proxy/spider tool contains a wealth of



information about the target application, which will be useful later in

identifying the various attack surfaces exposed by the application.

66

Chapter 4 



Mapping the Application

70779c04.qxd:WileyRed  9/14/07  3:12 PM  Page 66



Discovering Hidden Content

It is very common for applications to contain content and functionality which

is not directly linked or reachable from the main visible content. A common

example of this is functionality that has been implemented for testing or

debugging purposes and has never been removed. 

Another example arises where the application presents different functional-

ity to different categories of users (for example, anonymous users, authenti-

cated regular users, and administrators). Users at one privilege level who

perform exhaustive spidering of the application may miss functionality that is

visible to users at other levels. An attacker who discovers the functionality

may be able to exploit it to elevate her privileges within the application.

There are countless other cases in which interesting content and functional-

ity may exist that the mapping techniques previously described would not

identify, including:

■■

Backup copies of live files. In the case of dynamic pages, their file exten-



sion may have changed to one that is not mapped as executable,

enabling you to review the page source for vulnerabilities that can then

be exploited on the main page.

■■

Backup archives that contain a full snapshot of files within (or indeed



outside) the web root, possibly enabling you to easily identify all con-

tent and functionality within the application.

■■

New functionality that has been deployed to the server for testing but



not yet linked from the main application.

■■

Old versions of files that have not been removed from the server. In the



case of dynamic pages, these may contain vulnerabilities that have been

fixed in the current version but can still be exploited in the old version.

■■

Configuration and include files containing sensitive data such as data-



base credentials.

■■

Source files out of which the live application’s functionality has been



compiled.

■■

Log files that may contain sensitive information such as valid user-



names, session tokens, URLs visited, actions performed, and so on.

Effective discovery of hidden content requires a combination of automated

and manual techniques, and often relies upon a degree of luck.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   116   117   118   119   120   121   122   123   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish