19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

596 Chapter 14 n Automating Customized Attacks<br />

Your payloads need to sequence through all possible values for <strong>the</strong> final three<br />

digits. The token appears to use <strong>the</strong> same character set as hexadecimal numbers:<br />

0 to 9 and a to f. So you configure a payload source to generate all hexadecimal<br />

numbers in <strong>the</strong> range 0x000 to 0xfff, as shown in Figure 14-3.<br />

Figure 14-3: Configuring numeric payloads<br />

In attacks to enumerate valid session tokens, identifying hits is typically<br />

straightforward. In <strong>the</strong> present case you have determined that <strong>the</strong> <strong>application</strong><br />

returns an HTTP 200 response when a valid token is supplied and an HTTP 302<br />

redirect to <strong>the</strong> login page when an invalid token is supplied. Hence, you don’t<br />

need to configure any custom response analysis for this attack.<br />

Launching <strong>the</strong> attack causes Intruder to quickly iterate through <strong>the</strong> requests.<br />

The attack results are displayed in <strong>the</strong> form of a table. You can click each<br />

column heading to sort <strong>the</strong> results according to <strong>the</strong> contents of that column.<br />

Sorting by status code enables you to easily identify <strong>the</strong> valid tokens you have<br />

discovered, as shown in Figure 14-4. You can also use <strong>the</strong> filtering and search<br />

functions within <strong>the</strong> results window to help locate interesting items within<br />

a large set of results.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!