19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4 n Mapping <strong>the</strong> Application 75<br />

(see Chapter 3 for more details). The traditional <strong>web</strong> spider’s URL-based view<br />

of <strong>the</strong> <strong>application</strong> is useful in <strong>the</strong>se situations. In <strong>the</strong> EIS <strong>application</strong>, <strong>the</strong><br />

/shop and /pub paths employ REST-style URLs, and spidering <strong>the</strong>se areas easily<br />

provides unique links to <strong>the</strong> items available within <strong>the</strong>se paths.<br />

Figure 4-1: Mapping part of an <strong>application</strong> using Burp Spider<br />

Although it can often be effective, this kind of fully automated approach to<br />

content enumeration has some significant limitations:<br />

n Unusual navigation mechanisms (such as menus dynamically created<br />

and handled using complicated JavaScript code) often are not handled<br />

properly by <strong>the</strong>se tools, so <strong>the</strong>y may miss whole areas of an <strong>application</strong>.<br />

n Links buried within compiled client-side objects such as Flash or Java<br />

applets may not be picked up by a spider.<br />

n Multistage functionality often implements fine-grained input validation<br />

checks, which do not accept <strong>the</strong> values that may be submitted by an automated<br />

tool. For example, a user registration form may contain fields for<br />

name, e-mail address, telephone number, and zip code. An automated

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!