The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet818/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   814   815   816   817   818   819   820   821   ...   875
Bog'liq
3794 1008 4334

482

Chapter 13 



Automating Bespoke Attacks

70779c13.qxd:WileyRed  9/14/07  3:14 PM  Page 482



while (nextRequest())

{

try



{

output = parseResponse(issueRequest(buildRequest()));

}

catch (Exception e)



{

output = e.toString();

}

System.out.println(params[currentParam].name + “\t” + 



payloads.getPayload() + “\t” + output);

}

}



public static void main(String[] args)

{

new JAttack().doAttack();



}

}

That’s it! To compile and run this code, you will need to download the Java



SDK and JRE from Sun, and then execute the following:

> javac JAttack.java

> java JAttack

In our example configuration, the tool’s output is:

param   payload status  length

DocID   3000    500     220

DocID   3001    200     48179

DocID   3002    200     62881

DocID   3003    500     220

...


Assuming a normal network connection and amount of processing power,

JAttack is capable of issuing hundreds of individual requests per minute and

outputting the pertinent details, enabling you to very quickly identify valid

document identifiers for further investigation.

It may appear that the attack just illustrated is no more sophisticated than

the original bash script example, which required only a few lines of code.

However, because of the way JAttack is engineered, it is trivial to modify it to

deliver much more sophisticated attacks, incorporating multiple request para-

meters, a variety of different payload sources, and arbitrarily complex pro-

cessing of responses. In the following sections, we will make some minor

additions to JAttack’s code, which make it considerably more powerful.


Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   814   815   816   817   818   819   820   821   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish