19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER<br />

14<br />

Automating Customized Attacks<br />

This chapter does not introduce any new categories of vulnerabilities. Ra<strong>the</strong>r, it<br />

examines one key element in an effective methodology for hacking <strong>web</strong> <strong>application</strong>s<br />

— <strong>the</strong> use of automation to streng<strong>the</strong>n and accelerate customized attacks.<br />

The range of techniques involved can be applied throughout <strong>the</strong> <strong>application</strong> and<br />

to every stage of <strong>the</strong> attack process, from initial mapping to actual exploitation.<br />

Every <strong>web</strong> <strong>application</strong> is different. Attacking an <strong>application</strong> effectively involves<br />

using various manual procedures and techniques to understand its behavior<br />

and probe for vulnerabilities. It also entails bringing to bear your experience<br />

and intuition in an imaginative way. Attacks typically are customized in nature,<br />

tailored to <strong>the</strong> particular behavior you have identified and to <strong>the</strong> specific ways in<br />

which <strong>the</strong> <strong>application</strong> enables you to interact with and manipulate it. Performing<br />

customized attacks manually can be extremely laborious and is prone to mistakes.<br />

The most successful <strong>web</strong> <strong>application</strong> <strong>hackers</strong> take <strong>the</strong>ir customized attacks a<br />

step fur<strong>the</strong>r and find ways to automate <strong>the</strong>m to make <strong>the</strong>m easier, faster, and<br />

more effective.<br />

This chapter describes a proven methodology for automating customized<br />

attacks. This methodology combines <strong>the</strong> virtues of human intelligence and<br />

computerized brute force, usually with devastating results. This chapter also<br />

examines various potential obstacles that may hinder <strong>the</strong> use of automation,<br />

and ways in which <strong>the</strong>se obstacles can be circumvented.<br />

571

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!