19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4 n Mapping <strong>the</strong> Application 89<br />

n Testing for alternative file extensions on identified resources<br />

n Spidering from discovered content<br />

n Automatic fingerprinting of valid and invalid responses to reduce false<br />

positives<br />

All exercises are carried out recursively, with new discovery tasks being<br />

scheduled as new <strong>application</strong> content is discovered. Figure 4-8 shows a content<br />

discovery session in progress against <strong>the</strong> EIS <strong>application</strong>.<br />

Figure 4-8: A content discovery session in progress against <strong>the</strong> EIS <strong>application</strong><br />

TIP The DirBuster project from OWASP is also a useful resource when performing<br />

automated content discovery tasks. It includes large lists of directory<br />

names that have been found in <strong>the</strong> wild, ordered by frequency of occurrence.<br />

Use of Public Information<br />

The <strong>application</strong> may contain content and functionality that are not presently linked<br />

from <strong>the</strong> main content but that have been linked in <strong>the</strong> past. In this situation,<br />

it is likely that various historical repositories will still contain references to <strong>the</strong><br />

hidden content. Two main types of publicly available resources are useful here:<br />

n Search engines such as Google, Yahoo, and MSN. These maintain a finegrained<br />

index of all content that <strong>the</strong>ir powerful spiders have discovered,<br />

and also cached copies of much of this content, which persists even after<br />

<strong>the</strong> original content has been removed.<br />

n Web archives such as <strong>the</strong> WayBack Machine, located at www.archive.org/.<br />

These archives maintain a historical record of a large number of <strong>web</strong>sites.<br />

In many cases <strong>the</strong>y allow users to browse a fully replicated snapshot of a<br />

given site as it existed at various dates going back several years.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!