19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 14-11:<br />

The Brutus<br />

tool for testing<br />

for weak<br />

web logins.<br />

Chapter 14: Websites and Applications<br />

Most commercial web vulnerability scanners have decent dictionary-based<br />

web password crackers but none (that I’m aware of) can do true brute-force<br />

testing like Brutus can. As I discuss in Chapter 7, your password-cracking<br />

success is highly dependent on your dictionary lists. Here are some popular<br />

sites that house dictionary files and other miscellaneous word lists:<br />

✓ ftp://ftp.cerias.purdue.edu/pub/dict<br />

✓ http://packetstormsecurity.org/Crackers/wordlists<br />

✓ www.outpost9.com/files/WordLists.html<br />

Acunetix Web Vulnerability Scanner also tests for weak passwords during<br />

its scans. I’ve successfully used this scanner to uncover weak Outlook Web<br />

Access (OWA) passwords that I wouldn’t have found otherwise. Such a finding<br />

often leads to further penetration of OWA and related systems.<br />

You might not need a password-cracking tool at all because many front-end<br />

web systems, such as storage management systems and IP video and physical<br />

access control systems, simply have the passwords that came on them. These<br />

default passwords are usually “password,” “admin,” or nothing at all. Some<br />

passwords are even embedded right in the login page’s source code, such as<br />

the network camera source code shown in lines 207 and 208 in Figure 14-12.<br />

297

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!