19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

92 Chapter 4 n Mapping <strong>the</strong> Application<br />

Many <strong>application</strong> servers ship with default content that may help you attack<br />

<strong>the</strong>m. For example, sample and diagnostic scripts may contain known vulnerabilities<br />

or functionality that may be leveraged for a malicious purpose.<br />

Fur<strong>the</strong>rmore, many <strong>web</strong> <strong>application</strong>s incorporate common third-party components<br />

for standard functionality, such as shopping carts, discussion forums,<br />

or content management system (CMS) functions. These are often installed to a<br />

fixed location relative to <strong>the</strong> <strong>web</strong> root or to <strong>the</strong> <strong>application</strong>’s starting directory.<br />

Automated tools lend <strong>the</strong>mselves naturally to this type of task, and many<br />

issue requests from a large database of known default <strong>web</strong> server content, thirdparty<br />

<strong>application</strong> components, and common directory names. While <strong>the</strong>se tools<br />

do not rigorously test for any hidden custom functionality, <strong>the</strong>y can often be<br />

useful in discovering o<strong>the</strong>r resources that are not linked within <strong>the</strong> <strong>application</strong><br />

and that may be of interest in formulating an attack.<br />

Wikto is one of <strong>the</strong> many free tools that performs <strong>the</strong>se types of scans, additionally<br />

containing a configurable brute-force list for content. As shown in<br />

Figure 4-9, when used against <strong>the</strong> Extreme Internet Shopping site, it identifies<br />

some directories using its internal wordlist. Because it has a large database of<br />

common <strong>web</strong> <strong>application</strong> software and scripts, it has also identified <strong>the</strong> following<br />

directory, which an attacker would not discover through automated or<br />

user-driven spidering:<br />

http://eis/phpmyadmin/<br />

Figure 4-9: Wikto being used to discover content and some known vulnerabilities<br />

Additionally, although <strong>the</strong> /gb directory had already been identified via<br />

spidering, Wikto has identified <strong>the</strong> specific URL:<br />

/gb/index.php?login=true<br />

Wikto checks for this URL because it is used in <strong>the</strong> gbook PHP <strong>application</strong>,<br />

which contains a publicly known vulnerability.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!