01.09.2015 Views

4.0

1NSchAb

1NSchAb

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

99<br />

Web Application Penetration Testing<br />

When a web application is vulnerable to this type of attack, it will<br />

pass unvalidated input sent through requests back to the client.<br />

The common modus operandi of the attack includes a design step,<br />

in which the attacker creates and tests an offending URI, a social<br />

engineering step, in which she convinces her victims to load this<br />

URI on their browsers, and the eventual execution of the offending<br />

code using the victim’s browser.<br />

Commonly the attacker’s code is written in the Javascript language,<br />

but other scripting languages are also used, e.g., Action-<br />

Script and VBScript. Attackers typically leverage these vulnerabilities<br />

to install key loggers, steal victim cookies, perform clipboard<br />

theft, and change the content of the page (e.g., download links).<br />

One of the primary difficulties in preventing XSS vulnerabilities<br />

is proper character encoding. In some cases, the web server<br />

or the web application could not be filtering some encodings of<br />

characters, so, for example, the web application might filter out<br />

“”, but might not filter %3cscript%3e which simply includes<br />

another encoding of tags.<br />

How to Test<br />

Black Box testing<br />

A black-box test will include at least three phases:<br />

[1] Detect input vectors. For each web page, the tester must determine<br />

all the web application’s user-defined variables and how<br />

to input them. This includes hidden or non-obvious inputs such<br />

as HTTP parameters, POST data, hidden form field values, and<br />

predefined radio or selection values. Typically in-browser HTML<br />

editors or web proxies are used to view these hidden variables.<br />

See the example below.<br />

Ideally all HTML special characters will be replaced with HTML entities.<br />

The key HTML entities to identify are:<br />

> (greater than)<br />

< (less than)<br />

& (ampersand)<br />

‘ (apostrophe or single quote)<br />

“ (double quote)<br />

However, a full list of entities is defined by the HTML and XML<br />

specifications. Wikipedia has a complete reference [1].<br />

Within the context of an HTML action or JavaScript code, a different<br />

set of special characters will need to be escaped, encoded,<br />

replaced, or filtered out. These characters include:<br />

\n (new line)<br />

\r (carriage return)<br />

\’ (apostrophe or single quote)<br />

\” (double quote)<br />

\\ (backslash)<br />

\uXXXX (unicode values)<br />

For a more complete reference, see the Mozilla JavaScript guide.<br />

[2]<br />

Example 1<br />

For example, consider a site that has a welcome notice “ Welcome<br />

%username% “ and a download link.<br />

[2] Analyze each input vector to detect potential vulnerabilities.<br />

To detect an XSS vulnerability, the tester will typically use specially<br />

crafted input data with each input vector. Such input data is<br />

typically harmless, but trigger responses from the web browser<br />

that manifests the vulnerability. Testing data can be generated by<br />

using a web application fuzzer, an automated predefined list of<br />

known attack strings, or manually.<br />

Some example of such input data are the following:<br />

alert(123)<br />

The tester must suspect that every data entry point can result in<br />

an XSS attack. To analyze it, the tester will play with the user variable<br />

and try to trigger the vulnerability.<br />

Let’s try to click on the following link and see what happens:<br />

“>alert(document.cookie)<br />

For a comprehensive list of potential test strings, see the XSS Filter<br />

Evasion Cheat Sheet.<br />

http: /example.com/index.php?user=alert(123)<br />

If no sanitization is applied this will result in the following popup:<br />

[3] For each test input attempted in the previous phase, the tester<br />

will analyze the result and determine if it represents a vulnerability<br />

that has a realistic impact on the web application’s security.<br />

This requires examining the resulting web page HTML and searching<br />

for the test input. Once found, the tester identifies any special<br />

characters that were not properly encoded, replaced, or filtered<br />

out. The set of vulnerable unfiltered special characters will depend<br />

on the context of that section of HTML.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!