19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

114 Chapter 4 n Mapping <strong>the</strong> Application<br />

Summary<br />

Mapping <strong>the</strong> <strong>application</strong> is a key prerequisite to attacking it. It may be tempting<br />

to dive in and start probing for bugs, but taking time to gain a sound understanding<br />

of <strong>the</strong> <strong>application</strong>’s functionality, technologies, and attack surface will<br />

pay dividends down <strong>the</strong> line.<br />

As with almost all of <strong>web</strong> <strong>application</strong> hacking, <strong>the</strong> most effective approach<br />

is to use manual techniques supplemented where appropriate by controlled<br />

automation. No fully automated tool can carry out a thorough mapping of <strong>the</strong><br />

<strong>application</strong> in a safe way. To do this, you need to use your hands and draw on<br />

your own experience. The core methodology we have outlined involves <strong>the</strong><br />

following:<br />

n Manual browsing and user-directed spidering to enumerate <strong>the</strong> <strong>application</strong>’s<br />

visible content and functionality<br />

n Use of brute force combined with human inference and intuition to discover<br />

as much hidden content as possible<br />

n An intelligent analysis of <strong>the</strong> <strong>application</strong> to identify its key functionality,<br />

behavior, security mechanisms, and technologies<br />

n An assessment of <strong>the</strong> <strong>application</strong>’s attack surface, highlighting <strong>the</strong> most<br />

promising functions and behavior for more focused probing into exploitable<br />

vulnerabilities<br />

Questions<br />

Answers can be found at http://mdsec.net/wahh.<br />

1. While mapping an <strong>application</strong>, you encounter <strong>the</strong> following URL:<br />

https://wahh-app.com/CookieAuth.dll?GetLogon?curl=Z2Fdefault.<br />

aspx<br />

What information can you deduce about <strong>the</strong> technologies employed on<br />

<strong>the</strong> server and how it is likely to behave?<br />

2. The <strong>application</strong> you are targeting implements <strong>web</strong> forum functionality.<br />

Here is <strong>the</strong> only URL you have discovered:<br />

http://wahh-app.com/forums/ucp.php?mode=register<br />

How might you obtain a listing of forum members?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!