19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

614 Chapter 14 n Automating Customized Attacks<br />

4. You are formulating an automated attack to brute-force a login function<br />

to discover additional account credentials. You find that <strong>the</strong> <strong>application</strong><br />

returns an HTTP redirection to <strong>the</strong> same URL regardless of whe<strong>the</strong>r you<br />

submit valid or invalid credentials. In this situation, what is <strong>the</strong> most likely<br />

means you can use to detect hits?<br />

5. When you are using an automated attack to harvest data from within <strong>the</strong><br />

<strong>application</strong>, you will often find that <strong>the</strong> information you are interested in<br />

is preceded by a static string that enables you to easily capture <strong>the</strong> data<br />

following it. For example:<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!