19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 20 n A Web Application Hacker’s Toolkit 749<br />

Figure 20-1: HttpWatch analyzes <strong>the</strong> HTTP requests issued by Internet Explorer<br />

Firefox<br />

Firefox is currently <strong>the</strong> second most widely used <strong>web</strong> browser. By most estimates<br />

it makes up approximately 35% of <strong>the</strong> market. The majority of <strong>web</strong><br />

<strong>application</strong>s work correctly on Firefox; however, it has no native support for<br />

ActiveX controls.<br />

There are many subtle variations among different browsers’ handling of<br />

HTML and JavaScript, particularly when <strong>the</strong>y do not strictly comply with <strong>the</strong><br />

standards. Often, you will find that an <strong>application</strong>’s defenses against bugs<br />

such as cross-site scripting mean that your attacks are not effective against<br />

every browser platform. Firefox’s popularity is sufficient that Firefox-specific<br />

XSS exploits are perfectly valid, so you should test <strong>the</strong>se against Firefox if you<br />

encounter difficulties getting <strong>the</strong>m to work against IE. Also, features specific to<br />

Firefox have historically allowed a range of attacks to work that are not possible<br />

against IE, as described in Chapter 13.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!