19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

86 Chapter 4 n Mapping <strong>the</strong> Application<br />

Additionally, <strong>the</strong> site map created during user-directed spidering identified<br />

<strong>the</strong>se resources:<br />

http://eis/pub/media/100<br />

http://eis/pub/media/117<br />

http://eis/pub/user/11<br />

O<strong>the</strong>r numeric values in a similar range are likely to identify fur<strong>the</strong>r resources<br />

and information.<br />

TIP Burp Intruder is highly customizable and can be used to target any portion<br />

of an HTTP request. Figure 4-7 shows Burp Intruder being used to perform<br />

a brute-force attack on <strong>the</strong> first half of a filename to make <strong>the</strong> requests:<br />

http://eis/auth/AddPassword<br />

http://eis/auth/ForgotPassword<br />

http://eis/auth/GetPassword<br />

http://eis/auth/ResetPassword<br />

http://eis/auth/RetrievePassword<br />

http://eis/auth/UpdatePassword<br />

...<br />

Figure 4-7: Burp Intruder being used to perform a customized brute-force attack on<br />

part of a filename

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!