19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

112 Chapter 4 n Mapping <strong>the</strong> Application<br />

Mapping <strong>the</strong> Extreme Internet Shopping Application<br />

Having mapped <strong>the</strong> content and functionality of <strong>the</strong> EIS <strong>application</strong>, many paths<br />

could be followed to attack <strong>the</strong> <strong>application</strong>, as shown in Figure 4-15.<br />

Figure 4-15: The attack surface exposed by <strong>the</strong> EIS <strong>application</strong><br />

The /auth directory contains au<strong>the</strong>ntication functionality. A full review of<br />

all au<strong>the</strong>ntication functions, session handling, and access control is worthwhile,<br />

including fur<strong>the</strong>r content discovery attacks.<br />

Within <strong>the</strong> /core path, <strong>the</strong> sitestats page appears to accept an array of parameters<br />

delimited by <strong>the</strong> pipe character (|). As well as conventional input-based<br />

attacks, o<strong>the</strong>r values could be brute-forcible, such as source, location, and<br />

IP, in an attempt to reveal more information about o<strong>the</strong>r users or about <strong>the</strong><br />

page specified in pageID. It may also be possible to find out information about

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!