12.07.2015 Views

Devices - Penetration Testing Like a Hacker. - SecNiche Security Labs

Devices - Penetration Testing Like a Hacker. - SecNiche Security Labs

Devices - Penetration Testing Like a Hacker. - SecNiche Security Labs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HOW-TOFigure 4. Offsec Exploit Archive Searchinjection vulnerability. Thus, SQL injection plays animportant part in any pen testing routine.SQL Inject Me 0.4.5: This add-on comes from aleading information security firm-<strong>Security</strong> Compass.This add-on will test a website for SQL injectionvulnerabilities by substituting HTML form values withcrafted database escape strings that are used in anSQL injection attack. Although this extension will nottry to expose the security of a website, it’ll look fordatabase error messages in the page. Hence, just like aweb vulnerability scanner, this extension will enumeratethe possible entry points without intruding into thesystem. (Add-on Link: https://addons.mozilla.org/en-US/firefox/addon/sql-inject-me/).• To use this add-on you need to go to Tools > SQLInject ME > Open SQL Inject Me Sidebar.• Once you’re at a login page or on a HTML form,you can test this add-on by clicking the ‘Test allforms with all attacks’ buttons in the sidebar to testthat particular page (see Figure 5).Cross-site scriptingCross-site scripting (XSS): XSS vulnerability is usuallyfound in web applications. In this attack, a malicioususer crafts a URL of a vulnerable website in such a waythat when the malicious code is executed then client’ssession cookie is sent to the malicious user. This enableshim to steal sensitive information from client’s account.The crafted malicious link can easily embedded a HTMLdocument inside a frame using inline HTML frame tagFigure 6. XSS Me Test Results…. Recently websites like Bing.com(MAPS), Google Appspot, Forbes, EC Council andSamba Web Administration Tool (SWAT) were exposedof the XSS vulnerability.XSS Me 0.4.4: This tool works in the same way asSQL Inject Me. This add-on detects reflected XSSvulnerabilities and points out the possible entry pointsfor an attack. This add-on shows the resulting HTMLpage as vulnerable only when JavaScript value (document.vulnerable=true). XSS Me comes from SecCom <strong>Labs</strong>.(Add-on Link: https://addons.mozilla.org/en-US/firefox/addon/xss-me/).Access VulnerabilityAccess Vulnerability: Web servers can sometimes beaffected by file access vulnerability where a malicioususer uses a mere web browser to get unauthorizedaccess to the files stored on the server. This vulnerabilitydoesn’t allow the malicious user to delete, modify orcreate a file; the user can only read or copy the file fromthe computer. The malicious user gets access to thefile by specifically requesting its name by using a nonstandardURL for bypassing the file access controls ofthe server.Access Me 0.2.4: Web applications affected by accessvulnerability are tested with four different methods.File access requests are sent by using sessionFigure 5. Offsec Exploit Archive SearchFigure 7. Access Me Test Summary05/2011 (5) SeptemberPage 44http://pentestmag.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!